Efficient Sharing of Encrypted Data
This paper describes the design of a censorship-resistant distributed file sharing protocol which has been implemented on top of gnunet, an anonymous, reputation-based network. We focus on the encoding layer of the gnunet file-sharing protocol which supports efficient dissemination of encrypted data as well as queries over encrypted data. The main idea advocated in this paper is that simple cryptographic techniques are sufficient to engineer an efficient data encoding that can make it significantly harder to selectively censor information. Our encoding allows users to share files encrypted under descriptive keys which are the basis for querying the network for content. A key property of our encoding is that intermediaries can filter invalid encrypted replies without being able to decrypt the query or the reply. Files are stored in small chunks which are distributed and replicated automatically by the Gnunet infrastructure. Additionally, data files may be stored in plaintext or encrypted form or as a combination of both and encrypted on demand.
KeywordsEncode Scheme Malicious Node Encrypt Data Dictionary Attack Boolean Query
Unable to display preview. Download preview PDF.
- 1.K. Bennett, C. Grothoff, T. Horozov, I. Patrascu, and T. Stef. Technical report.Google Scholar
- 2.I. Clarke. A distributed decentralised information storage and retrieval system, 1999.Google Scholar
- 3.I. Clarke, O. Sandberg, B. Wiley, and T. Hong. Freenet: A distributed anonymous information storage and retrieval system. In Proc. of the ICSI Workshop on Design Issues in Anonymity and Unobservability. International Computer Science Institute, 2000.Google Scholar
- 4.Steven Hazel. Libfreenet, a case study in horrors incomprehensible to the mind of man, and other secure protocol design mistakes., Feb. 2002.Google Scholar
- 5.Aviel D. Rubin Marc Waldman and Lorrie Faith Cranor. Publius: A robust, tamper-evident, censorship-resistant, web publishing system. In Proc. 9th USENIX Security Symposium, pages 59–72, August 2000.Google Scholar
- 6.David Mazieres Marc Waldman. Tangler: A censorhip-resistant publishing system based on document entanglements. 2001.Google Scholar
- 7.Mojo Nation. Technology overview, Feb. 2000.Google Scholar
- 9.Dawn Xiaodong Song, David Wagner, and Adrian Perrig. Practical techniques for searches on encrypted data. In IEEE Symposium on Security and Privacy, pages 44–55, 2000.Google Scholar
- 10.Stratton Oakmont vs Prodigy Services Company, 1995 N.Y. Misc. Lexis 229, (N.Y. Sup. Ct. Nassau Co., 1995).Google Scholar