Back to Search
Start Over
Shared-Dining: Broadcasting Secret Shares Using Dining-Cryptographers Groups
- Source :
- Lecture Notes in Computer Science, 21th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS), 21th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2021, Valletta, Malta. pp.83-98, ⟨10.1007/978-3-030-78198-9_6⟩, Distributed Applications and Interoperable Systems ISBN: 9783030781972, DAIS
- Publication Year :
- 2021
- Publisher :
- HAL CCSD, 2021.
-
Abstract
- A k-anonymous broadcast can be implemented using a small group of dining cryptographers to first share the message, followed by a flooding phase started by group members. Members have little incentive to forward the message in a timely manner, as forwarding incurs costs, or they may even profit from keeping the message. In worst case, this leaves the true originator as the only sender, rendering the dining-cryptographers phase useless and compromising their privacy. We present a novel approach using a modified dining-cryptographers protocol to distributed shares of an (n,k)-Shamir's secret sharing scheme. Finally, all group members broadcast their received share through the network, allowing any recipient of k shares to reconstruct the message, enforcing anonymity. If less than k group members broadcast their shares, the message cannot be decoded thus preventing privacy breaches for the originator. Our system provides (n-|attackers|)-anonymity for up to k-1 attackers and has little performance impact on dissemination. We show these results in a security analysis and performance evaluation based on a proof-of-concept prototype. Throughput rates between 10 and 100 kB/s are enough for many real applications with high privacy requirements, e.g., financial blockchain system.<br />16 pages, 5 figures
- Subjects :
- FOS: Computer and information sciences
050101 languages & linguistics
Security analysis
Dining cryptographers problem
Computer Science - Cryptography and Security
Computer science
Throughput
02 engineering and technology
Broadcasting
Computer security
computer.software_genre
Secret sharing
Computer Science - Networking and Internet Architecture
[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]
Privacy protocol
0202 electrical engineering, electronic engineering, information engineering
0501 psychology and cognitive sciences
[INFO]Computer Science [cs]
Communication source
Network protocol
Peer-to-Peer networking
Networking and Internet Architecture (cs.NI)
business.industry
05 social sciences
Flooding (computer networking)
Dining cryptographers
020201 artificial intelligence & image processing
business
computer
Cryptography and Security (cs.CR)
Anonymity
Subjects
Details
- Language :
- English
- ISBN :
- 978-3-030-78197-2
- ISBNs :
- 9783030781972
- Database :
- OpenAIRE
- Journal :
- Lecture Notes in Computer Science, 21th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS), 21th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2021, Valletta, Malta. pp.83-98, ⟨10.1007/978-3-030-78198-9_6⟩, Distributed Applications and Interoperable Systems ISBN: 9783030781972, DAIS
- Accession number :
- edsair.doi.dedup.....cd89f53c0baab443750985a954adfd22