Skip to main content

Shared-Dining: Broadcasting Secret Shares Using Dining-Cryptographers Groups

  • Conference paper
  • First Online:
Distributed Applications and Interoperable Systems (DAIS 2021)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 12718))

Abstract

We introduce a combination of Shamir’s secret sharing and dining-cryptographers networks, which provides \((n-|\text {attackers}|)\)-anonymity for up to \(k-1\) attackers and has manageable performance impact on dissemination. A k-anonymous broadcast can be implemented using a small group of dining cryptographers to first share the message, followed by a flooding phase started by group members. Members have little incentive to forward the message in a timely manner, as forwarding incurs costs, or they may even profit from keeping the message. In worst case, this leaves the true originator as the only sender, rendering the dining-cryptographers phase useless and compromising their privacy. We present a novel approach using a modified dining-cryptographers protocol to distributed shares of an (nk)-Shamir’s secret sharing scheme. All group members broadcast their received share through the network, allowing any recipient of k shares to reconstruct the message, enforcing anonymity. If less than k group members broadcast their shares, the message cannot be decoded thus preventing privacy breaches for the originator. We demonstrate the privacy and performance results in a security analysis and performance evaluation based on a proof-of-concept prototype. Throughput rates between 10 and 100 kB/s are enough for many real applications with high privacy requirements, e.g., financial blockchain system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    See https://gitlab.com/kovri-project/kovri.

  2. 2.

    https://github.com/vs-uulm/thc-in-dc-simulation.

  3. 3.

    https://github.com/codahale/shamir.

References

  1. von Ahn, L., Bortz, A., Hopper, N.J.: K-anonymous message transmission. In: 10th ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 122–130. ACM, New York (2003)

    Google Scholar 

  2. Biryukov, A., Khovratovich, D., Pustogarov, I.: Deanonymisation of clients in Bitcoin P2P network. In: ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 15–29. ACM, New York (2014)

    Google Scholar 

  3. Chaum, D.: The dining cryptographers problem: unconditional sender and recipient untraceability. J. Cryptol. 1(1), 65–75 (1988)

    Article  MathSciNet  Google Scholar 

  4. Corrigan-Gibbs, H., Ford, B.: Dissent: accountable anonymous group messaging. In: 17th ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 340–350. ACM, New York (2010)

    Google Scholar 

  5. Gasca, M., Sauer, T.: Polynomial interpolation in several variables. Adv. Comput. Math. 12(4), 377 (2000). https://doi.org/10.1023/A:1018981505752

    Article  MathSciNet  MATH  Google Scholar 

  6. Golle, P., Juels, A.: Dining cryptographers revisited. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 456–473. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24676-3_27

    Chapter  Google Scholar 

  7. Koshy, P., Koshy, D., McDaniel, P.: An analysis of anonymity in bitcoin using P2P network traffic. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 469–485. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-662-45472-5_30

    Chapter  Google Scholar 

  8. Miers, I., Garman, C., Green, M., Rubin, A.D.: Zerocoin: anonymous distributed e-cash from Bitcoin. In: IEEE Symposium on Security and Privacy (SP), pp. 397–411, May 2013

    Google Scholar 

  9. Möser, M., et al.: An empirical analysis of traceability in the Monero blockchain. In: Proceedings on Privacy Enhancing Technologies Symposium (PoPETs 2018), vol. 3, pp. 143–163 (2018)

    Google Scholar 

  10. Mödinger, D., Hauck, F.J.: 3P3: strong flexible privacy for broadcasts. In: 4th International Workshop on Cyberspace Security (IWCSS 2020) (2020)

    Google Scholar 

  11. Mödinger, D., Kopp, H., Kargl, F., Hauck, F.J.: A flexible network approach to privacy of blockchain transactions. In: IEEE 38th International Conference on Distributed Computing Systems (ICDCS), pp. 1486–1491, July 2018

    Google Scholar 

  12. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)

    Article  MathSciNet  Google Scholar 

  13. Wolinsky, D.I., Corrigan-Gibbs, H., Ford, B., Johnson, A.: Dissent in numbers: making strong anonymity scale. In: 10th USENIX Conference on Operating Systems Design and Implementation (OSDI), pp. 179–192. USENIX Association, Berkeley (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to David Mödinger .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mödinger, D., Dispan, J., Hauck, F.J. (2021). Shared-Dining: Broadcasting Secret Shares Using Dining-Cryptographers Groups. In: Matos, M., Greve, F. (eds) Distributed Applications and Interoperable Systems. DAIS 2021. Lecture Notes in Computer Science(), vol 12718. Springer, Cham. https://doi.org/10.1007/978-3-030-78198-9_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-78198-9_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-78197-2

  • Online ISBN: 978-3-030-78198-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics