MP3: A More Efficient Private Presence Protocol
Authors:
Rahul Parhi,
Michael Schliep,
Nicholas Hopper
Abstract:
This paper proposes MP3, the second privacy-preserving presence protocol that leaks no information about the graph structure of the social network. Several cryptographic techniques are applied to improve the existing DP5 protocol---the first privacy-preserving presence protocol---while maintaining the same level of privacy. The key contribution of this paper is the use of a dynamic broadcast encry…
▽ More
This paper proposes MP3, the second privacy-preserving presence protocol that leaks no information about the graph structure of the social network. Several cryptographic techniques are applied to improve the existing DP5 protocol---the first privacy-preserving presence protocol---while maintaining the same level of privacy. The key contribution of this paper is the use of a dynamic broadcast encryption scheme to reduce the size of the presence database. This enables cheaper registration and lookup required for the protocol. As compared to DP5, MP3 requires on the order of ten times less bandwidth of the servers during registration, and requires on the order of two times less bandwidth for lookup, for a small number of users ($N=10000$). Furthermore, these savings asymptotically increase with the number of users. The client-side latency is also improved significantly in MP3, as compared with DP5. We provide an evaluation of the performance and scalability of both protocols.
△ Less
Submitted 9 September, 2016;
originally announced September 2016.
Anarchy in Tor: Performance Cost of Decentralization
Authors:
John Geddes,
Mike Schliep,
Nicholas Hopper
Abstract:
Like many routing protocols, the Tor anonymity network has decentralized path selection, in clients locally and independently choose paths. As a result, network resources may be left idle, leaving the system in a suboptimal state. This is referred to as the price of anarchy, where agents acting in their own self interest can make poor decisions when viewed in a global context. In this paper we exp…
▽ More
Like many routing protocols, the Tor anonymity network has decentralized path selection, in clients locally and independently choose paths. As a result, network resources may be left idle, leaving the system in a suboptimal state. This is referred to as the price of anarchy, where agents acting in their own self interest can make poor decisions when viewed in a global context. In this paper we explore the cost of anarchy in Tor by examining the potential performance increases that can be gained by centrally optimizing circuit and relay selection using global knowledge. In experiments with both offline and online algorithms, we show that centrally coordinated clients can achieve up to 75% higher bandwidth compared to traditional Tor. Drawing on these findings, we design and evaluate a decentralized version of our online algorithm, in which relays locally distribute information enabling clients to make smarter decisions locally and perform downloads 10-60% faster. Finally, we perform a privacy analysis of the decentralized algorithm against a passive and active adversary trying to reduce anonymity of clients and increase their view of the Tor network. We conclude that this decentralized algorithm does not enable new attacks, while providing significantly higher performance.
△ Less
Submitted 13 June, 2016; v1 submitted 7 June, 2016;
originally announced June 2016.