Completeness theorems for non-cryptographic fault-tolerant distributed computation
STOC '88 Proceedings of the twentieth annual ACM symposium on Theory of computing
Multiparty unconditionally secure protocols
STOC '88 Proceedings of the twentieth annual ACM symposium on Theory of computing
Secure hypergraphs: privacy from partial broadcast
STOC '95 Proceedings of the twenty-seventh annual ACM symposium on Theory of computing
Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
An on-demand secure routing protocol resilient to byzantine failures
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Private Computations in Networks: Topology versus Randomness
STACS '03 Proceedings of the 20th Annual Symposium on Theoretical Aspects of Computer Science
Private Computation - k-Connected versus 1-Connected Networks
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Secure Communication in an Unknown Network Using Certificates
ASIACRYPT '99 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Proceedings of the First International Workshop on Information Hiding
Anonymous Connections and Onion Routing
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Secure Multipath Communication in Mobile Ad hoc Networks
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
Protocols for secure computations
SFCS '82 Proceedings of the 23rd Annual Symposium on Foundations of Computer Science
How to generate and exchange secrets
SFCS '86 Proceedings of the 27th Annual Symposium on Foundations of Computer Science
Secure communication in broadcast channels: the answer to Franklin and Wright's question
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
IEEE Network: The Magazine of Global Internetworking
Communications in unknown networks: Preserving the secret of topology
Theoretical Computer Science
Hi-index | 0.00 |
Cryptography investigates security aspects of data distributed in a network. This kind of security does not protect the secrecy of the network topology against being discovered if some kind of communication has to be established. But there are several scenarios where even the network topology has to be a part of the secret. In this paper we study the question of communication within a secret network where all processing nodes of the network have only partial knowledge (e.g. given as routing tables) of the complete topology. We introduce a model for measuring the loss of security of the topology when far distance communication takes place. We will investigate lower bounds on the knowledge that can be deduced from the communication string. Several kinds of routing tables are not sufficient to guarantee the secrecy of topology. On the other hand, if a routing table allows to specify the direction from which a message is coming from we can run a protocol solving the all–to–all communication problem such that no processing node can gain additional knowledge about the network. Finally, we investigate the problem, whether a knowledge base can be generated from local knowledge of the processing nodes without losing the state of secrecy. It will be shown that this is not possible for static networks and most kinds of dynamic networks.