Abstract
We study the problem of hiding communication: while it is easy to encrypt a message sent from Alice to Bob, it is hard to hide that such a communication takes place. Communiaction hiding is one of the fundamental privacy challenges, especially in case of an adversary having a complete view of the traffic and controlling a large number of nodes.
Following the Beimel-Dolev’s buses concept and Young-Yung drunk motorcyclist protocol we propose a theoretical concept called Ghost Train. The ghost trains are travelling at random through the network just as drunk motorcyclists and one version of Beimel-Dolev buses. However, there are no assigned seats or motorcyclists holding a ciphertext. The trains are not generated by the senders, once created they travel forever, and hold messages in the way that the older messages gradually decay and are replaced by new messages inserted into the train. Each train route is random and stochastically independent from the existing sender-destination pairs, thus the protocol is fully oblivious. Additionally, it works for dynamic networks where the nodes can join and leave the network (unlike the Beimel-Dolev solution) and yet it is not possible to indicate the origin of any given package (unlike in the drunken motorcyclist protocol).
Our protocol is based on basic tools (Bloom filters, PRNGs) and a novel concept of inserting many ciphertexts on the same place and their decay.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Tor: Anonymity online. www.torproject.org
Aleliunas, R., Karp, R.M., Lipton, R.J., Lovász, L., Rackoff, C.: Random walks, universal traversal sequences, and the complexity of maze problems. In: 20th FOCS, pp. 218–223 (1979)
Aspnes, J., Ruppert, E.: An introduction to population protocols. Bull. Eur. Assoc. Theor. Comput. Sci. 93, 98–117 (2007)
Beimel, A., Dolev, S.: Buses for anonymous message delivery. J. Cryptology 16(1), 25–39 (2003)
Berman, R., Fiat, A., Gomułkiewicz, M., Klonowski, M., Kutyłowski, M., Levinboim, T., Ta-Shma, A.: Provable unlinkability against traffic analysis with low message overhead. J. Cryptology 28(3), 623–640 (2015)
Rackoff, C., Simon, D.R.: Cryptographic defense against traffic analysis. In: 25th ACM STOC, pp. 672–681. ACM (1993)
Sherwood, R., Bhattacharjee, B., Srinivasan, A.: P5: a protocol for scalable anonymous communication. In: 2002 IEEE Symposium on Security and Privacy, pp. 58–70 (2002)
Young, A., Yung, M.: The drunk motorcyclist protocol for anonymous communication. In: IEEE Conference on Communications and Network Security, pp. 157–165. IEEE (2014)
Acknowledgments
The research was supported by the Polish National Science Centre, Decision DEC-2013/08/M/ST6/00928.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Błaśkiewicz, P., Kutyłowski, M., Lemiesz, J., Sulkowska, M. (2016). Ghost Train for Anonymous Communication. In: Wang, G., Ray, I., Alcaraz Calero, J., Thampi, S. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2016. Lecture Notes in Computer Science(), vol 10066. Springer, Cham. https://doi.org/10.1007/978-3-319-49148-6_20
Download citation
DOI: https://doi.org/10.1007/978-3-319-49148-6_20
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-49147-9
Online ISBN: 978-3-319-49148-6
eBook Packages: Computer ScienceComputer Science (R0)