2002
DOI: 10.1007/3-540-45450-0_8
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Sharing of Encrypted Data

Abstract: Abstract. This paper describes the design of a censorship-resistant distributed file sharing protocol which has been implemented on top of gnunet, an anonymous, reputation-based network. We focus on the encoding layer of the gnunet file-sharing protocol which supports efficient dissemination of encrypted data as well as queries over encrypted data. The main idea advocated in this paper is that simple cryptographic techniques are sufficient to engineer an efficient data encoding that can make it significantly h… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
20
0

Year Published

2003
2003
2021
2021

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 24 publications
(21 citation statements)
references
References 3 publications
1
20
0
Order By: Relevance
“…Therefore, we decide to keep the circuit creation and relay selection under the user's direct control, and we propose the use of bloom filters to let the user identify which relays can connect to each other. 2 In particular, we require each peer to attach to his public onion key a bloom filter where the neighbors of the peer have been encoded, called neighbor bloom filter and built over the neighbors' identifiers. The filter, as well as the onion key, must be signed by the peer with his identity key, and is stored and distributed together with the onion key.…”
Section: Building An Onion Circuitmentioning
confidence: 99%
“…Therefore, we decide to keep the circuit creation and relay selection under the user's direct control, and we propose the use of bloom filters to let the user identify which relays can connect to each other. 2 In particular, we require each peer to attach to his public onion key a bloom filter where the neighbors of the peer have been encoded, called neighbor bloom filter and built over the neighbors' identifiers. The filter, as well as the onion key, must be signed by the peer with his identity key, and is stored and distributed together with the onion key.…”
Section: Building An Onion Circuitmentioning
confidence: 99%
“…The main disadvantage of the dual receiver cryptosystem is that the server needs to send an auxiliary private key to a client for decrypting a partial ciphertext, which is insecure in the real environment. Recently, there is much work on keyword search on encrypted files, such as Song et al [9], Bennett et al [10], and Chang et al [12]. In this paper, we borrow the idea of partial decipherment, and propose an efficient privacy preserving keyword search scheme by improving PEKS, which requires no private key transmission and is more applicable to a cloud environment.…”
Section: A Related Workmentioning
confidence: 99%
“…Proving the authenticity of a remote microprocessor [11] and (ultimately) the trustworthiness of a remote machine are still open problems. gnunet compensates for the impossibility of guaranteeing anonymity against very powerful attackers by providing deniability [1]. Even if a powerful adversary can determine who sent a message, the deniable encoding and searching mechanism for content (see [1]) ensures that the adversary may still be unable to determine what the message is about.…”
Section: Measuring Anonymitymentioning
confidence: 99%
“…This situation is not as problematic as it may sound since peers can start with a very slow download rate r. This will increase the network load on the network, especially since idle nodes are likely to spread a query much further than busy nodes would. Thus the load on the network will quickly rise (at least in the proximity of the peer starting the download), allowing the peer to increase r. Since gnunet's content encoding [1] has the inherent property that a downloading node can initially only send a small set of queries (due to the tree-structure of the encoding), the requirement that a node must start with a small r to achieve anonymity until the network load rises is in practice what the code must do anyway. The network always has some level of background noise for key exchange and node advertisement propagation that should be sufficient for a node to hide the origin of a single query.…”
Section: Measuring Anonymitymentioning
confidence: 99%
See 1 more Smart Citation