A k-anonymous broadcast can be implemented using a small group of dining cryptographers to first share the message, followed by a flooding phase started by group members. Members have little incentive to forward the message in a timely manner, as forwarding incurs costs, or they may even profit from keeping the message. In worst case, this leaves the true originator as the only sender, rendering the dining-cryptographers phase useless and compromising their privacy. We present a novel approach using a modified dining-cryptographers protocol to distributed shares of an (n,k)-Shamir's secret sharing scheme. Finally, all group members broadcast their received share through the network, allowing any recipient of k shares to reconstruct the message, enforcing anonymity. If less than k group members broadcast their shares, the message cannot be decoded thus preventing privacy breaches for the originator. Our system provides (n-|attackers|)-anonymity for up to k-1 attackers and has little performance impact on dissemination. We show these results in a security analysis and performance evaluation based on a proof-of-concept prototype. Throughput rates between 10 and 100 kB/s are enough for many real applications with high privacy requirements, e.g., financial blockchain system.
翻译:使用一小群餐饮密码员首先分享信息,然后由集团成员开始一个洪涝阶段,可以进行k-匿名广播。成员没有多少动力来及时传递信息,因为转发会带来费用,或者他们甚至可能从保存信息中获益。最糟糕的是,这让真正的发端人成为唯一的发端人,使得餐饮-加密人阶段变得无用,并损害他们的隐私。我们提出了一个新颖的办法,用修改的餐饮-加密人协议来分发一个(n,k)-Shamir的秘密共享计划。最后,所有集团成员通过网络广播他们收到的份额,允许任何K股份的接收人重建信息,加强匿名。如果低于k组成员广播其股份,信息就无法解码,从而防止发端人的隐私被侵犯。我们的系统为K-1攻击者提供匿名,对传播工作没有多大影响。我们在基于校对电子原型的安全分析和业绩评价中展示了这些结果,让所有K股份的接收人得以重建信息,加强匿名性。如果比k集团成员播放其股份少一些,那么,信息就无法解码,从而防止发端人侵犯隐私。我们系统为K-100k-B/s足够高的系统。