Scalable and Provably Secure P2P Communication Protocols

نویسندگان

  • Megumi Ando
  • Anna Lysyanskaya
  • Eli Upfal
چکیده

In contrast to the enormous advances made in cryptographic technology over the last 40 years, there have been correspondingly few advances in anonymizing channels. This lag in advances is due the technical challenge of constructing a provably secure, yet practical, solution to the problem. While practical approaches, such as the widely used Tor network, have not been proven to be secure; provably secure approaches in the academic literature are not exible or scalable enough to be used widely in real systems. In this paper, we address this open problem. We present three scalable and provably secure peer-to-peermessaging protocols, one for each of the standard adversary models: network, passive, and active. Like in the Tor network, our solutions are exible in that they are onion-routing protocols, where each client independently chooses the message paths for its messages. Additionally, our solutions do not ood the network with dummy messages (i.e., the number of messages that each participating user generates is no more than polylog in the network size), and the routing is properly load-balanced between the servers. Our work is the rst to present a family of Tor-like protocols that utilizes dynamic routing and is provably secure.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC

Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...

متن کامل

Scalable and Secure Peer-to-Peer Systems with Support for QoS

Secure communication architecture is client-server based and not peer-to-peer based. NATs and firewalls tamper with or inspect data packets and that runs afoul with security protocols, such as IPSec and SSL/TLS. Client-server based architecture is not suitable for very high data rates when the server becomes a bottleneck in the communication. This architecture is not scalable and a single point...

متن کامل

Artemia: a family of provably secure authenticated encryption schemes

Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme which supports the associated data. Artemia uses the permutation based mode, JHAE, that is provably secure in the ideal permutation model. The scheme does not require the in...

متن کامل

Password-Based Group Key Exchange in a Constant Number of Rounds

With the development of grids, distributed applications are spread across multiple computing resources and require efficient security mechanisms among the processes. Although protocols for authenticated group Diffie-Hellman key exchange protocols seem to be the natural mechanisms for supporting these applications, current solutions are either limited by the use of public key infrastructures or ...

متن کامل

RatFish: A File Sharing Protocol Provably Secure against Rational Users

The proliferation of P2P computing has recently been propelled by popular applications, most notably file sharing protocols such as BitTorrent. These protocols provide remarkable efficiency and scalability, as well as adaptivity to dynamic situations. However, none of them is secure against attacks from rational users, i.e., users that misuse the protocol if doing so increases their benefits (e...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1706.05367  شماره 

صفحات  -

تاریخ انتشار 2017