Revisiting Colored Networks and Privacy Preserving Censorship

Reliable networks are obviously an important aspect of critical information infrastructures. Dolev-Dwork-Waarts-Yung linked research on reliable point-to-point networks with privacy and authenticity. In their threat model the adversary can only take over a number of nodes bounded by a threshold k. Hirt-Maurer introduced the concept of an adversary structure (i.e. the complement of an access structure). Kumar-Goundan-Srinathan-Rangan and Desmedt-Wang-Burmester generalized Dolev-Dwork-Waarts-Yung scenarios to the case of a general adversary structure. Burmester-Desmedt introduced a special adversary structure, now called a color based adversary structure. Their argument in favor of their model is that using automated attacks (such as worms), a vulnerability can be exploited on all computers in the network running the same platform (color). In their model the adversary can control all nodes that use up to k different platforms (or colors). We will demonstrate one of the limitations of their model. Although the family of color based adversary structures has a trivial representation which size grows polynomial in the size of the graph, we will demonstrate in this paper that deciding reliability issues and security issues are co-NP-complete. In most societies censorship is common. Indeed, for centuries it has often been viewed by authorities as an essential security tool. We apply the computational complexity result to study censorship. Authorities may require network designers to demonstrate the capability to censor the internet. We present a zero-knowledge interactive proof for the case of a color based adversary structure.

[1]  Matthew K. Franklin,et al.  Secure Communications in Minimal Connectivity Models , 1998, EUROCRYPT.

[2]  David Chaum,et al.  Minimum Disclosure Proofs of Knowledge , 1988, J. Comput. Syst. Sci..

[3]  David S. Johnson,et al.  Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .

[4]  Moti Yung,et al.  Perfectly secure message transmission , 1993, JACM.

[5]  Silvio Micali,et al.  Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems , 1991, JACM.

[6]  Nancy A. Lynch,et al.  Distributed Algorithms , 1992, Lecture Notes in Computer Science.

[7]  Ueli Maurer,et al.  Player Simulation and General Adversary Structures in Perfect Multiparty Computation , 2000, Journal of Cryptology.

[8]  Yvo Desmedt,et al.  Is hierarchical public-key certification the next target for hackers? , 2004, CACM.

[9]  Yongge Wang,et al.  A Complete Characterization of Tolerable Adversary Structures for Secure Point-to-Point Transmissions Without Feedback , 2005, ISAAC.

[10]  Amos Beimel,et al.  Efficient reliable communication over partially authenticated networks , 2004, Distributed Computing.

[11]  Matthew K. Franklin,et al.  Secure Hypergraphs: Privacy from Partial Broadcast , 2004, SIAM J. Discret. Math..

[12]  Reihaneh Safavi-Naini,et al.  Radio Networks with Reliable Communication , 2005, COCOON.

[13]  Matthew K. Franklin,et al.  Reliable Communication over Partially Authenticated Networks , 1999, Theor. Comput. Sci..

[14]  Vassos Hadzilacos,et al.  Issues of fault tolerance in concurrent computations (databases, reliability, transactions, agreement protocols, distributed computing) , 1985 .

[15]  Yongge Wang,et al.  Efficient Zero-Knowledge Proofs for Some Practical Graph Problems , 2002, SCN.

[16]  Jacques Stern,et al.  Advances in Cryptology — EUROCRYPT ’99 , 1999, Lecture Notes in Computer Science.

[17]  K. Srinathan,et al.  On perfectly secure communication over arbitrary networks , 2002, PODC '02.

[18]  Yongge Wang,et al.  Perfectly Secure Message Transmission Revisited , 2002, IEEE Transactions on Information Theory.

[19]  Yongge Wang,et al.  Secure Communication in Broadcast Channels: The Answer to Franklin and Wright's Question , 1999, EUROCRYPT.

[20]  Danny Dolev,et al.  The Byzantine Generals Strike Again , 1981, J. Algorithms.

[21]  Kaisa Nyberg,et al.  Advances in Cryptology — EUROCRYPT'98 , 1998 .

[22]  Mitsuru Ito,et al.  Secret sharing scheme realizing general access structure , 1989 .

[23]  Silvio Micali,et al.  The Knowledge Complexity of Interactive Proof Systems , 1989, SIAM J. Comput..

[24]  Aggelos Kiayias,et al.  Traitor Tracing with Constant Transmission Rate , 2002, EUROCRYPT.

[25]  Ronald L. Rivest,et al.  Introduction to Algorithms , 1990 .