skip to main content
article
Free Access

Xor-trees for efficient anonymous multicast and reception

Published:01 May 2000Publication History
Skip Abstract Section

Abstract

We examine the problem of efficient anonymous multicast and reception in general communication networks. We present algorithms that achieve anonymous communication, are protected against traffic analysis, and require O(1) amortized communication complexity on each link and low computational comlexity. The algorithms support sender anonymity, receiver(s) anonymity, or sender-receiver anonymity.

References

  1. BEN-OR, M., GOLDWASSER, S., AND WIGDERSON, A. 1988. Completeness theorems for non-cryptographic fault-tolerant distributed computation. In Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing (STOC '88, Chicago, IL, May 2-4), J. Simon, Chair. ACM Press, New York, NY, 1-10. Google ScholarGoogle Scholar
  2. BLUM,M.AND MICALI, S. 1984. How to generate cryptographically strong sequences of pseudo-random bits. SIAM J. Comput. 13, 4 (Nov.), 850-864. Google ScholarGoogle Scholar
  3. BOS,J.AND DEN BOER, B. 1990. Detection of disrupters in the DC protocol. In Proceedings of the Workshop on Advances in Cryptology (EUROCRYPT '89, Houthalen, Belgium, Apr. 10-13), J.-J. Quisquater and J. Vandewalle, Eds. Springer Lecture Notes in Computer Science. Springer-Verlag, New York, NY, 320-327. Google ScholarGoogle Scholar
  4. CANETTI, R., FEIGE, U., GOLDREICH, O., AND NAOR, M. 1996. Adaptively secure multi-party computation. In Proceedings of the 28th Annual ACM Symposium on Theory of Computing (STOC '96, Philadelphia, PA, May 22-24), G. L. Miller, Chair. ACM Press, New York, NY, 639-648. Google ScholarGoogle Scholar
  5. CANETTI, R., KUSHILEVITZ, E., OSTROVSKY, R., AND ROS~N, A. 1997. Randomness vs. fault-tolerance. In Proceedings of the 16th Annual ACM Symposium on Principles of Distributed Computing (PODC '97, Santa Barbara, CA, Aug. 21-24), J. E. Burns and H. Attiya, Chairs. ACM Press, New York, NY, 35-44. Google ScholarGoogle Scholar
  6. CHAUM, D. 1981. Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24, 2 (Feb.), 84-88. Google ScholarGoogle Scholar
  7. CHAUM, D. 1988. The dining cryptographers problem: Unconditional sender and recipient untraceability. J. Cryptology 1, 1 (), 65-75. Google ScholarGoogle Scholar
  8. CHAUM,D.AND DAMGARD, I. 1988. Multiparty unconditionally secure protocols. In Proceed-ings of the Twentieth Annual ACM Symposium on Theory of Computing (STOC '88, Chicago, IL, May 2-4), J. Simon, Chair. ACM Press, New York, NY, 11-19. Google ScholarGoogle Scholar
  9. FRANKLIN, M., GALIL, Z., AND YUNG, M. 1993. Eavesdropping games: A graph-theoretic approach to privacy in distributed systems. In Proceedings of the IEEE Symposium on Foundations of Computer Science (FOCS '93). IEEE Computer Society Press, Los Alamitos, CA.Google ScholarGoogle Scholar
  10. GOLDREICH, O., MICALI, S., AND WIGDERSON, A. 1987. How to play ANY mental game. In Proceedings of the 19th Annual ACM Conference on Theory of Computing (STOC '87, New York, NY, May 25-27), A. V. Aho, Ed. ACM Press, New York, NY, 218-229. Google ScholarGoogle Scholar
  11. HASTAD, J., IMPAGLIAZZO, R., LEVIN,L.A.,AND LUBY, M. 1999. Construction of a pseudo-random generator from any one-way function. SIAM J. Comput. 28, 4, 1364-1396. Google ScholarGoogle Scholar
  12. KNUTH, D. E. 1997. The Art of Computer Programming. 3rd ed. Addison-Wesley, Reading, MA. Google ScholarGoogle Scholar
  13. KUSHILEVITZ, E., MICALI, S., AND OSTROVSKY, R. 1994. Reducibility and completeness in multi-party private computations. In Proceedings of the 35th Annual Symposium on Foundations of Computer Science (Nov.). IEEE Computer Society Press, Los Alamitos, CA.Google ScholarGoogle Scholar
  14. PFITZMANN, A. 1985. How to implement ISDNs without user observability: some remarks. Tech Rep. TR 14/85. University of Karlsruhe, Germany.Google ScholarGoogle Scholar
  15. PFITZMANN,A.AND WAIDNER, M. 1987. Networks without user observability. Comput. Secur. 6, 2 (Apr.), 158-166. Google ScholarGoogle Scholar
  16. PFITZMANN, A., PFITZMANN, B., AND WAIDNER, M. 1991. ISDN-mixes: Untraceable communica-tion with very small bandwidth overhead. In Proceedings of the GI/ITG Conference on Communication in Distributed Systems (Feb., Mannheim, Germany). 451-463. Google ScholarGoogle Scholar
  17. RACKOFF,C.AND SIMON, D. R. 1993. Cryptographic defense against traffic analysis. In Proceedings of the 25th Annual ACM Symposium on Theory of Computing (STOC '93, San Diego, CA, May 16-18), R. Kosaraju, D. Johnson, and A. Aggarwal, Chairs. ACM Press, New York, NY, 672-681. Google ScholarGoogle Scholar
  18. SYVERSON,P.F.,GOLDSCHLAG,D.M.,AND REED, M. G. 1997. Anonymous connections and onion routing. In Proceedings of the 1997 IEEE Computer Society Symposium on Reasearch in Security and Privacy (Oakland, CA, May). IEEE Computer Society Press, Los Alamitos, CA. Google ScholarGoogle Scholar
  19. WAIDNER, M. 1990. Unconditional sender and recipient untraceability in spite of active attacks. In Proceedings of the Workshop on Advances in Cryptology (EUROCRYPT '89, Houthalen, Belgium, Apr. 10-13), J.-J. Quisquater and J. Vandewalle, Eds. Springer Lecture Notes in Computer Science. Springer-Verlag, New York, NY, 302-319. Google ScholarGoogle Scholar
  20. WAIDNER,M.AND PFITZMANN, B. 1990. The dining cryptographers in the disco: Unconditional sender and recipient untraceability with computationally secure serviceability. In Proceed-ings of the Workshop on Advances in Cryptology (EUROCRYPT '89, Houthalen, Belgium, Apr. 10-13), J.-J. Quisquater and J. Vandewalle, Eds. Springer Lecture Notes in Computer Science. Springer-Verlag, New York, NY, 690. Google ScholarGoogle Scholar

Index Terms

  1. Xor-trees for efficient anonymous multicast and reception

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Information and System Security
      ACM Transactions on Information and System Security  Volume 3, Issue 2
      May 2000
      72 pages
      ISSN:1094-9224
      EISSN:1557-7406
      DOI:10.1145/354876
      Issue’s Table of Contents

      Copyright © 2000 ACM

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 1 May 2000
      Published in tissec Volume 3, Issue 2

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader