Skip to main content

Showing 1–7 of 7 results for author: Mödinger, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2104.03032  [pdf, ps, other

    cs.CR cs.NI

    Shared-Dining: Broadcasting Secret Shares using Dining-Cryptographers Groups

    Authors: David Mödinger, Juri Dispan, Franz J. Hauck

    Abstract: A k-anonymous broadcast can be implemented using a small group of dining cryptographers to first share the message, followed by a flooding phase started by group members. Members have little incentive to forward the message in a timely manner, as forwarding incurs costs, or they may even profit from keeping the message. In worst case, this leaves the true originator as the only sender, rendering t… ▽ More

    Submitted 7 April, 2021; originally announced April 2021.

    Comments: 16 pages, 5 figures

  2. arXiv:2103.17091  [pdf, other

    cs.NI cs.CR

    Arbitrary Length k-Anonymous Dining-Cryptographers Communication

    Authors: David Mödinger, Alexander Heß, Franz J. Hauck

    Abstract: Dining-cryptographers networks (DCN) can achieve information-theoretical privacy. Unfortunately, they are not well suited for peer-to-peer networks as they are used in blockchain applications to disseminate transactions and blocks among participants. In previous but preliminary work, we proposed a threephase approach with an initial phase based on a DCN with a group size of k while later phases ta… ▽ More

    Submitted 31 March, 2021; originally announced March 2021.

    Comments: 11 pages, 7 figures

  3. Statistical privacy-preserving message dissemination for peer-to-peer networks

    Authors: David Mödinger, Jan-Hendrik Lorenz, Fanz J. Hauck

    Abstract: Concerns for the privacy of communication is widely discussed in research and overall society. For the public financial infrastructure of blockchains, this discussion encompasses the privacy of transaction data and its broadcasting throughout the network. To tackle this problem, we transform a discrete-time protocol for contact networks over infinite trees into a computer network protocol for peer… ▽ More

    Submitted 17 March, 2021; v1 submitted 2 February, 2021; originally announced February 2021.

    Comments: 6 figures, 19 pages, single column

  4. A Flexible Network Approach to Privacy of Blockchain Transactions

    Authors: David Mödinger, Henning Kopp, Frank Kargl, Franz J. Hauck

    Abstract: For preserving privacy, blockchains can be equipped with dedicated mechanisms to anonymize participants. However, these mechanism often take only the abstraction layer of blockchains into account whereas observations of the underlying network traffic can reveal the originator of a transaction request. Previous solutions either provide topological privacy that can be broken by attackers controlling… ▽ More

    Submitted 30 July, 2018; originally announced July 2018.

    Comments: 6 pages, 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS)

  5. Blackchain: Scalability for Resource-Constrained Accountable Vehicle-to-X Communication

    Authors: Rens Wouter van der Heijden, Felix Engelmann, David Mödinger, Franziska Schönig, Frank Kargl

    Abstract: In this paper, we propose a new Blockchain-based message and revocation accountability system called Blackchain. Combining a distributed ledger with existing mechanisms for security in V2X communication systems, we design a distributed event data recorder (EDR) that satisfies traditional accountability requirements by providing a compressed global state. Unlike previous approaches, our distributed… ▽ More

    Submitted 24 October, 2017; originally announced October 2017.

    Comments: 5 pages, 2 figures, SERIAL '17 Workshop

  6. arXiv:1604.05899  [pdf, ps, other

    cs.IT cs.SC

    Decoding Interleaved Gabidulin Codes using Alekhnovich's Algorithm

    Authors: Sven Puchinger, Sven Müelich, David Mödinger, Johan Rosenkilde né Nielsen, Martin Bossert

    Abstract: We prove that Alekhnovich's algorithm can be used for row reduction of skew polynomial matrices. This yields an $O(\ell^3 n^{(ω+1)/2} \log(n))$ decoding algorithm for $\ell$-Interleaved Gabidulin codes of length $n$, where $ω$ is the matrix multiplication exponent, improving in the exponent of $n$ compared to previous results.

    Submitted 15 September, 2016; v1 submitted 20 April, 2016; originally announced April 2016.

    Comments: 6 pages, presented at the International Workshop on Algebraic and Combinatorial Coding Theory (ACCT) 2016, submitted to Electronic Notes in Discrete Mathematics (volume devoted to ACCT 2016)

  7. arXiv:1601.05205  [pdf, ps, other

    cs.IT

    An Alternative Decoding Method for Gabidulin Codes in Characteristic Zero

    Authors: Sven Müelich, Sven Puchinger, David Mödinger, Martin Bossert

    Abstract: Gabidulin codes, originally defined over finite fields, are an important class of rank metric codes with various applications. Recently, their definition was generalized to certain fields of characteristic zero and a Welch--Berlekamp like algorithm with complexity $O(n^3)$ was given. We propose a new application of Gabidulin codes over infinite fields: low-rank matrix recovery. Also, an alternativ… ▽ More

    Submitted 21 April, 2016; v1 submitted 20 January, 2016; originally announced January 2016.

    Comments: 5 pages, accepted at IEEE International Symposium on Information Theory 2016