针对流量分析的加密防御

C. Rackoff, Daniel R. Simon
{"title":"针对流量分析的加密防御","authors":"C. Rackoff, Daniel R. Simon","doi":"10.1145/167088.167260","DOIUrl":null,"url":null,"abstract":"We present a model which allows us formally to define “untraceability” of messages in a network of synchronously communicating processors. We consider several different definitions, based on different assumptions about the strength of the “adversary” attempting to identify the senders and receivers of messages; for example, the adversary may be able to control some of the processors to obtain information, or even disrupt the traffic in the network. We present efficient protocols which are provably secure against each such adversary, using such cryptographic techniques as secure multiparty computation ([ GMWl) and non-interactive zero-knowledge proof ([BFM]). One proof of security also relies on an interesting general lemma about the “mixing” achieved by certain kinds of random processes, or “shuffles”, performed on a set of items. *This work was supported in part by NSERC operating grants and ITRC, an Ontario Centre of Excellence. t Department of Computer Science, University of Toronto, Toronto, Ontario, Canada M5S 1A4; rackoff@cs.toronto. edu : D6partement IRO, Universit6 de Montr6al, C.P. 6128, Succursale “A”, Montr&d, Qu6bec, H3C 3J7; simon@iro.umontreal .ca Permission to copy without fee all or part of this material is granted provided that the copies are not made or distributed for direct commercial advantage, the ACM copyright notice and the title of the publication and its date appaar, and notice is given that copying is by permission of the Association for Computing Machinery. To copy otherwise, or to republish, requires a fee and/or specific permission. 25th ACM STOC ‘93-51931CA, K.A o 1993 ACM 0-89791 -591 -7/93 /0005 /0672 . ..$1 .50","PeriodicalId":280602,"journal":{"name":"Proceedings of the twenty-fifth annual ACM symposium on Theory of Computing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1993-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"135","resultStr":"{\"title\":\"Cryptographic defense against traffic analysis\",\"authors\":\"C. Rackoff, Daniel R. Simon\",\"doi\":\"10.1145/167088.167260\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We present a model which allows us formally to define “untraceability” of messages in a network of synchronously communicating processors. We consider several different definitions, based on different assumptions about the strength of the “adversary” attempting to identify the senders and receivers of messages; for example, the adversary may be able to control some of the processors to obtain information, or even disrupt the traffic in the network. We present efficient protocols which are provably secure against each such adversary, using such cryptographic techniques as secure multiparty computation ([ GMWl) and non-interactive zero-knowledge proof ([BFM]). One proof of security also relies on an interesting general lemma about the “mixing” achieved by certain kinds of random processes, or “shuffles”, performed on a set of items. *This work was supported in part by NSERC operating grants and ITRC, an Ontario Centre of Excellence. t Department of Computer Science, University of Toronto, Toronto, Ontario, Canada M5S 1A4; rackoff@cs.toronto. edu : D6partement IRO, Universit6 de Montr6al, C.P. 6128, Succursale “A”, Montr&d, Qu6bec, H3C 3J7; simon@iro.umontreal .ca Permission to copy without fee all or part of this material is granted provided that the copies are not made or distributed for direct commercial advantage, the ACM copyright notice and the title of the publication and its date appaar, and notice is given that copying is by permission of the Association for Computing Machinery. To copy otherwise, or to republish, requires a fee and/or specific permission. 25th ACM STOC ‘93-51931CA, K.A o 1993 ACM 0-89791 -591 -7/93 /0005 /0672 . ..$1 .50\",\"PeriodicalId\":280602,\"journal\":{\"name\":\"Proceedings of the twenty-fifth annual ACM symposium on Theory of Computing\",\"volume\":\"2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1993-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"135\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the twenty-fifth annual ACM symposium on Theory of Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/167088.167260\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the twenty-fifth annual ACM symposium on Theory of Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/167088.167260","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 135

摘要

我们提出了一个模型,该模型允许我们正式定义同步通信处理器网络中消息的“不可追溯性”。我们考虑了几种不同的定义,基于对试图识别信息发送者和接收者的“对手”强度的不同假设;例如,攻击者可能能够控制某些处理器以获取信息,甚至破坏网络中的流量。我们提出了有效的协议,使用安全多方计算([GMWl)和非交互式零知识证明([BFM])等加密技术,可证明对每个这样的对手都是安全的。安全性的一个证明还依赖于一个有趣的一般引理,即在一组项目上执行的某些随机过程或“洗牌”所实现的“混合”。*这项工作得到了NSERC和ITRC(安大略省卓越中心)的部分资助。t多伦多大学计算机科学系,加拿大安大略省多伦多M5S 1A4;rackoff@cs.toronto。edu:蒙特利尔大学信息学部,cpp 6128,蒙特利尔大学A座,H3C 3J7;simon@iro.umontreal .ca允许免费复制本材料的全部或部分内容,前提是这些副本不是为了直接的商业利益而制作或分发的,ACM版权声明和出版物的标题及其日期已注明,并通知复制是由计算机械协会许可的。以其他方式复制或重新发布需要付费和/或特定许可。第25届ACM STOC ' 93-51931CA, K.A o 1993 ACM 0-89791 -591 -7/93 /0005 /0672 ..…1美元50
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Cryptographic defense against traffic analysis
We present a model which allows us formally to define “untraceability” of messages in a network of synchronously communicating processors. We consider several different definitions, based on different assumptions about the strength of the “adversary” attempting to identify the senders and receivers of messages; for example, the adversary may be able to control some of the processors to obtain information, or even disrupt the traffic in the network. We present efficient protocols which are provably secure against each such adversary, using such cryptographic techniques as secure multiparty computation ([ GMWl) and non-interactive zero-knowledge proof ([BFM]). One proof of security also relies on an interesting general lemma about the “mixing” achieved by certain kinds of random processes, or “shuffles”, performed on a set of items. *This work was supported in part by NSERC operating grants and ITRC, an Ontario Centre of Excellence. t Department of Computer Science, University of Toronto, Toronto, Ontario, Canada M5S 1A4; rackoff@cs.toronto. edu : D6partement IRO, Universit6 de Montr6al, C.P. 6128, Succursale “A”, Montr&d, Qu6bec, H3C 3J7; simon@iro.umontreal .ca Permission to copy without fee all or part of this material is granted provided that the copies are not made or distributed for direct commercial advantage, the ACM copyright notice and the title of the publication and its date appaar, and notice is given that copying is by permission of the Association for Computing Machinery. To copy otherwise, or to republish, requires a fee and/or specific permission. 25th ACM STOC ‘93-51931CA, K.A o 1993 ACM 0-89791 -591 -7/93 /0005 /0672 . ..$1 .50
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信