Advertisement

Efficient Sharing of Encrypted Data

  • Krista Bennett
  • Christian Grothoff
  • Tzvetan Horozov
  • Ioana Patrascu
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2384)

Abstract

This paper describes the design of a censorship-resistant distributed file sharing protocol which has been implemented on top of gnunet, an anonymous, reputation-based network. We focus on the encoding layer of the gnunet file-sharing protocol which supports efficient dissemination of encrypted data as well as queries over encrypted data. The main idea advocated in this paper is that simple cryptographic techniques are sufficient to engineer an efficient data encoding that can make it significantly harder to selectively censor information. Our encoding allows users to share files encrypted under descriptive keys which are the basis for querying the network for content. A key property of our encoding is that intermediaries can filter invalid encrypted replies without being able to decrypt the query or the reply. Files are stored in small chunks which are distributed and replicated automatically by the Gnunet infrastructure. Additionally, data files may be stored in plaintext or encrypted form or as a combination of both and encrypted on demand.

Keywords

Encode Scheme Malicious Node Encrypt Data Dictionary Attack Boolean Query 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    K. Bennett, C. Grothoff, T. Horozov, I. Patrascu, and T. Stef. Technical report.Google Scholar
  2. 2.
    I. Clarke. A distributed decentralised information storage and retrieval system, 1999.Google Scholar
  3. 3.
    I. Clarke, O. Sandberg, B. Wiley, and T. Hong. Freenet: A distributed anonymous information storage and retrieval system. In Proc. of the ICSI Workshop on Design Issues in Anonymity and Unobservability. International Computer Science Institute, 2000.Google Scholar
  4. 4.
    Steven Hazel. Libfreenet, a case study in horrors incomprehensible to the mind of man, and other secure protocol design mistakes., Feb. 2002.Google Scholar
  5. 5.
    Aviel D. Rubin Marc Waldman and Lorrie Faith Cranor. Publius: A robust, tamper-evident, censorship-resistant, web publishing system. In Proc. 9th USENIX Security Symposium, pages 59–72, August 2000.Google Scholar
  6. 6.
    David Mazieres Marc Waldman. Tangler: A censorhip-resistant publishing system based on document entanglements. 2001.Google Scholar
  7. 7.
    Mojo Nation. Technology overview, Feb. 2000.Google Scholar
  8. 8.
    Michael O. Rabin. Efficient dispersal of information for security, load balancing, and fault tolerance. Journal of the ACM, 36(2):335–348, 1989.zbMATHCrossRefMathSciNetGoogle Scholar
  9. 9.
    Dawn Xiaodong Song, David Wagner, and Adrian Perrig. Practical techniques for searches on encrypted data. In IEEE Symposium on Security and Privacy, pages 44–55, 2000.Google Scholar
  10. 10.
    Stratton Oakmont vs Prodigy Services Company, 1995 N.Y. Misc. Lexis 229, (N.Y. Sup. Ct. Nassau Co., 1995).Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2002

Authors and Affiliations

  • Krista Bennett
    • 1
  • Christian Grothoff
    • 1
  • Tzvetan Horozov
    • 1
  • Ioana Patrascu
    • 1
  1. 1.S3 lab and CERIAS, Department of Computer SciencesPurdue UniversityUSA

Personalised recommendations