Skip to main content

Revisiting Colored Networks and Privacy Preserving Censorship

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 4347))

Abstract

Reliable networks are obviously an important aspect of critical information infrastructures. Dolev-Dwork-Waarts-Yung linked research on reliable point-to-point networks with privacy and authenticity. In their threat model the adversary can only take over a number of nodes bounded by a threshold k. Hirt-Maurer introduced the concept of an adversary structure (i.e. the complement of an access structure). Kumar-Goundan-Srinathan-Rangan and Desmedt-Wang-Burmester generalized Dolev-Dwork-Waarts-Yung scenarios to the case of a general adversary structure.

Burmester-Desmedt introduced a special adversary structure, now called a color based adversary structure. Their argument in favor of their model is that using automated attacks (such as worms), a vulnerability can be exploited on all computers in the network running the same platform (color). In their model the adversary can control all nodes that use up to k different platforms (or colors).

We will demonstrate one of the limitations of their model. Although the family of color based adversary structures has a trivial representation which size grows polynomial in the size of the graph, we will demonstrate in this paper that deciding reliability issues and security issues are co-NP-complete.

In most societies censorship is common. Indeed, for centuries it has often been viewed by authorities as an essential security tool. We apply the computational complexity result to study censorship. Authorities may require network designers to demonstrate the capability to censor the internet. We present a zero-knowledge interactive proof for the case of a color based adversary structure.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Beimel, A., Franklin, M.K.: Reliable communication over partially authenticated networks. In: Mavronicolas, M. (ed.) WDAG 1997. LNCS, vol. 1320, pp. 245–259. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  2. Beimel, A., Malka, L.: Efficient reliable communication over partially authenticated networks. Distributed Computing (in press, 2005)

    Google Scholar 

  3. Blum, M.: How to prove a theorem so no one else can claim it. In: Proceedings of the International Congress of Mathematicians, Berkeley, California, U.S.A., August 3–11, pp. 1444–1451 (1986)

    Google Scholar 

  4. Brassard, G., Chaum, D., Crépeau, C.: Minimum disclosure proofs of knowledge. Journal of Computer and System Sciences 37(2), 156–189 (1988)

    Article  MATH  MathSciNet  Google Scholar 

  5. Burmester, M., Desmedt, Y.G.: Is hierarchical public-key certification the next target for hackers? Communications of the ACM 47(8), 68–74 (2004)

    Article  Google Scholar 

  6. Cormen, T.H., Leiserson, C.E., Rivest, R.L.: Introduction to Algorithms. MIT Press, Mc. Graw-Hill (1990)

    Google Scholar 

  7. Desmedt, Y., Wang, Y., Burmester, M.: A complete characterization of tolerable adversary structures for secure point-to-point transmissions without feedback. In: Deng, X., Du, D.-Z. (eds.) ISAAC 2005. LNCS, vol. 3827, pp. 277–287. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  8. Desmedt, Y., Wang, Y., Safavi-Naini, R., Wang, H.: Radio networks with reliable communication. In: Wang, L. (ed.) COCOON 2005. LNCS, vol. 3595, pp. 16–19. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  9. Desmedt, Y., Wang, Y.: Perfectly secure message transmission revisited. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 502–517. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  10. Desmedt, Y., Wang, Y.: Efficient zero-knowledge protocols for some practical graph problems. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol. 2576, pp. 296–308. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  11. Dolev, D.: The Byzantine generals strike again. Journal of Algorithms 3, 14–30 (1982)

    Article  MATH  MathSciNet  Google Scholar 

  12. Dolev, D., Dwork, C., Waarts, O., Yung, M.: Perfectly secure message transmission. Journal of the ACM 40(1), 17–47 (1993)

    Article  MATH  MathSciNet  Google Scholar 

  13. Franklin, M., Wright, R.: Secure communication in minimal connectivity models. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 346–360. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  14. Franklin, M., Yung, M.: Secure hypergraphs: Privacy from partial broadcast. SIAM J. Discrete Math. 18(3), 437–450 (2004)

    Article  MATH  MathSciNet  Google Scholar 

  15. Franklin, M.K., Yung, M.: Secure hypergraphs: Privacy from partial broadcast. In: Proceedings of the twenty seventh annual ACM Symp. Theory of Computing, STOC, pp. 36–44 (1995)

    Google Scholar 

  16. Garey, M.R., Johnson, D.S.: Computers and Intractability: A Guide to the Theory of NP-Completeness. W. H. Freeman and Company, San Francisco (1979)

    MATH  Google Scholar 

  17. Goldreich, O., Micali, S., Wigderson, A.: Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems. Journal of the ACM 38(1), 691–729 (1991)

    MATH  MathSciNet  Google Scholar 

  18. Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems. SIAM J. Comput. 18(1), 186–208 (1989)

    Article  MATH  MathSciNet  Google Scholar 

  19. Gospels of Matthew, Mark, Luke, and John written, http://www9.nationalgeographic.com/lostgospel/timeline_04.html

  20. Hadzilacos, V.: Issues of Fault Tolerance in Concurrent Computations. PhD thesis, Harvard University, Cambridge, Massachusetts (1984)

    Google Scholar 

  21. Hirt, M., Maurer, U.: Player simulation and general adversary structures in perfect multiparty computation. Journal of Cryptology 13(1), 31–60 (2000)

    Article  MATH  MathSciNet  Google Scholar 

  22. Ito, M., Saito, A., Nishizeki, T.: Secret sharing schemes realizing general access structures. In: Proc. IEEE Global Telecommunications Conf., Globecom 1987, pp. 99–102. IEEE Communications Soc. Press, Los Alamitos (1987)

    Google Scholar 

  23. Kumar, M., Goundan, P., Srinathan, K., Rangan, C.: On perfectly secure communication over arbitrary networks. In: Proceedings of the Annual ACM Symposium on Principles of Distributed Computing (PODC), pp. 193–202 (2002)

    Google Scholar 

  24. Meier, B., Wilford, J.N.: How the gospel of Judas emerged. The New York Times (April 13, 2006), http://www.nytimes.com/2006/04/13/science/13judas.html

  25. NSA access codes have been secretly built into windows, http://ureader.co.uk/message/792934.aspx

  26. Social networks, quarterly journal

    Google Scholar 

  27. Wang, Y.: Secure communication in broadcast channels. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 446–458. Springer, Heidelberg (1999)

    Google Scholar 

  28. Zetter, K.: Cisco security hole a whopper (July 27, 2005), http://www.wired.com/news/privacy/0,1848,68328,00.html?tw=wn_tophead_2

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Desmedt, Y., Wang, Y., Burmester, M. (2006). Revisiting Colored Networks and Privacy Preserving Censorship. In: Lopez, J. (eds) Critical Information Infrastructures Security. CRITIS 2006. Lecture Notes in Computer Science, vol 4347. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11962977_12

Download citation

  • DOI: https://doi.org/10.1007/11962977_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69083-2

  • Online ISBN: 978-3-540-69084-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics