SLIDE 1 Topology-Hiding Computation for Large Diameter Graphs
Tal Moran
IDC Herzliya
Adi Akavia
The Academic College
SLIDE 2
MPC [Yao’86, GMW’87]: multiple parties can jointly compute a function of their private inputs, while revealing nothing beyond the output
SLIDE 3
MPC [Yao’86, GMW’87]: multiple parties can jointly compute a function of their private inputs, while revealing nothing beyond the output Many applications
SLIDE 4
MPC [Yao’86, GMW’87]: multiple parties can jointly compute a function of their private inputs, while revealing nothing beyond the output Many applications
Today: protect also meta-data!
SLIDE 5 Motivation: Private social network
Today: Facebook = “trusted third party”.
personal data & “social graph”
functions on data & graph
SLIDE 6 Motivation: Private social network
Today: Facebook = “trusted third party”.
personal data & “social graph”
functions on data & graph
Goal: Privacy preserving social network
No trusted third party!
Privacy for data & graph
SLIDE 7
MPC does NOT Suffice
SLIDE 8 MPC does NOT Suffice
Communication topology is public
SLIDE 9 MPC does NOT Suffice
Communication topology is public
– Typically: Complete graph – Also: General topologies (publicly known)
[ …. Halevi-Ishai-Jain-Kushilevitz-Rabin’2016]
SLIDE 10 MPC does NOT Suffice
Communication topology is public
– Typically: Complete graph – Also: General topologies (publicly known)
[ …. Halevi-Ishai-Jain-Kushilevitz-Rabin’2016]
Communication topology ≈ social graph
SLIDE 11 MPC does NOT Suffice
Communication topology is public
– Typically: Complete graph – Also: General topologies (publicly known)
[ …. Halevi-Ishai-Jain-Kushilevitz-Rabin’2016]
Communication topology ≈ social graph
topology is private
SLIDE 12 MPC does NOT Suffice
Communication topology is public
– Typically: Complete graph – Also: General topologies (publicly known)
[ …. Halevi-Ishai-Jain-Kushilevitz-Rabin’2016]
Communication topology ≈ social graph
topology is private Not protected by MPC!
SLIDE 13
Want: Topology Hiding MPC [MOR’15]
Topology hiding MPC is MPC that hides both inputs and communication graph.
SLIDE 14 More Motivation: Private Topology
- Mobile Networks
- Vehicle-to-Vehicle communication
- Mesh networks
- Internet-of-things
SLIDE 15 Topology Hiding MPC [MOR’15]
Settings:
- Parties (=nodes) have private inputs,
- Parties know their neighbors,
communicate directly only with neighbors.
d e f b c a g h
SLIDE 16 Topology Hiding MPC [MOR’15]
Settings:
- Parties (=nodes) have private inputs,
- Parties know their neighbors,
communicate directly only with neighbors.
The Goal: Compute any function of the inputs while revealing nothing beyond function’s output Reveal no info about the graph*
d e f b c a g h
SLIDE 17 Topology Hiding MPC [MOR’15]
Settings:
- Parties (=nodes) have private inputs,
- Parties know their neighbors,
communicate directly only with neighbors.
The Goal: Compute any function of the inputs while revealing nothing beyond function’s output Reveal no info about the graph*
*Need minimal info about the graph (e.g. bounds on diameter / #nodes)
d e f b c a g h
SLIDE 18 Topology Hiding MPC [MOR’15]
Settings:
- Parties (=nodes) have private inputs,
- Parties know their neighbors,
communicate directly only with neighbors.
The Goal: Compute any function of the inputs while revealing nothing beyond function’s output Reveal no info about the graph*
*Need minimal info about the graph (e.g. bounds on diameter / #nodes)
d e f b c a g h
Broadcast suffices
SLIDE 19 Is Topology Hiding MPC Possible?
Some Challenges:
“OR and forward”
d e f b c a g h
SLIDE 20 Is Topology Hiding MPC Possible?
Some Challenges:
“OR and forward”
d e f b c a g h
SLIDE 21 Is Topology Hiding MPC Possible?
Some Challenges:
“OR and forward”
d e f b c a g h
SLIDE 22 Is Topology Hiding MPC Possible?
Some Challenges:
“OR and forward”
d e f b c a g h
SLIDE 23 Is Topology Hiding MPC Possible?
Some Challenges:
“OR and forward”
– E.g. reveals distance to broadcaster
d e f b c a g h
SLIDE 24 Is Topology Hiding MPC Possible?
Some Challenges:
“OR and forward”
– E.g. reveals distance to broadcaster
d e f b c a g h
SLIDE 25 Is Topology Hiding MPC Possible?
Some Challenges:
“OR and forward”
– E.g. reveals distance to broadcaster
d e f b c a g h
SLIDE 26 Is Topology Hiding MPC Possible?
Some Challenges:
“OR and forward”
– E.g. reveals distance to broadcaster
d e f b c a g h
SLIDE 27 Is Topology Hiding MPC Possible?
Some Challenges:
“OR and forward”
– E.g. reveals distance to broadcaster – Not hiding even with encrypted messages
d e f b c a g h
SLIDE 28 Is Topology Hiding MPC Possible?
Some Challenges:
“OR and forward”
– E.g. reveals distance to broadcaster – Not hiding even with encrypted messages
d e f b c a g h
SLIDE 29
Impossible against Active Adversary
SLIDE 30 Impossible against Active Adversary
Active (=malicious) adversary: Can deviate from the protocol (e.g., abort).
Theorem [MOR’15]: Against an active adversary, Topology-hiding broadcast is impossible
SLIDE 31 Impossible against Active Adversary
Active (=malicious) adversary: Can deviate from the protocol (e.g., abort).
Theorem [MOR’15]: Against an active adversary, Topology-hiding broadcast is impossible Impossible already for simple graphs (chains) weak adversary (fail-stop)
SLIDE 32
Feasible against Passive Adversary
SLIDE 33 Feasible against Passive Adversary
Passive (=honest-but-curious) adversary: Follows the protocol (but tries to learn secrets).
Small diameter network graph: Distance between nodes at most logarithmic.
SLIDE 34 Feasible against Passive Adversary
Passive (=honest-but-curious) adversary: Follows the protocol (but tries to learn secrets).
Small diameter network graph: Distance between nodes at most logarithmic. Theorem [MOR’15, HMTZ’16]: Topology-hiding broadcast exists
- n small-diameter network graphs
against passive adversary
(assuming trapdoor permutations exist / DDH)
SLIDE 35 Feasible against Passive Adversary
Passive (=honest-but-curious) adversary: Follows the protocol (but tries to learn secrets).
Small diameter network graph: Distance between nodes at most logarithmic. Theorem [MOR’15, HMTZ’16]: Topology-hiding broadcast exists
- n small-diameter network graphs
against passive adversary
(assuming trapdoor permutations exist / DDH) given bounds on diameter & degree
SLIDE 36
This Work
Our question: Is small-diameter necessary?
SLIDE 37 This Work
Our question: Is small-diameter necessary? Our Main Result: Topology-hiding broadcast exists
- n large-diameter network graphs
against passive adversary
(under standard assumptions, e.g., DDH)
SLIDE 38 This Work
Our question: Is small-diameter necessary? Our Main Result: Topology-hiding broadcast exists
- n large-diameter network graphs
against passive adversary
(under standard assumptions, e.g., DDH)
given number
SLIDE 39
This Work: Results
Result 1: Topology-hiding broadcast is feasible for large-diameter graphs, including:
SLIDE 40 This Work: Results
Result 1: Topology-hiding broadcast is feasible for large-diameter graphs, including:
d e f c
chains
SLIDE 41 This Work: Results
Result 1: Topology-hiding broadcast is feasible for large-diameter graphs, including:
d e b a g d e f c
chains cycles
SLIDE 42 This Work: Results
Result 1: Topology-hiding broadcast is feasible for large-diameter graphs, including:
d e b a g d e f b c a g h d e f c
chains cycles trees
SLIDE 43 This Work: Results
Result 1: Topology-hiding broadcast is feasible for large-diameter graphs, including:
d e b a g d e f b c a g h d e f c
chains cycles trees Small- circumference graphs
d e f b c a g h
SLIDE 44 This Work: Results
Result 1: Topology-hiding broadcast is feasible for large-diameter graphs, including:
d e b a g d e f b c a g h d e f c
chains cycles trees Small- circumference graphs
d e f b c a g h
SLIDE 45 This Work: Results
Result 1: Topology-hiding broadcast is feasible for large-diameter graphs, including:
d e b a g d e f b c a g h d e f c
chains cycles trees Small- circumference graphs
d e f b c a g h
SLIDE 46
This Work: Results
Result 2: Topology hiding broadcast on cycles Topology hiding broadcast on trees
SLIDE 47
This Work: Results
Result 3: Topology hiding broadcast for 1) cycles and 2) small-diameter graphs Topology hiding broadcast for small-circumference graphs
SLIDE 48 This Work: Results
Result 3: Topology hiding broadcast for 1) cycles and 2) small-diameter graphs Topology hiding broadcast for small-circumference graphs Extensions:
We define: A distributed algorithm is “info-local” if output
- f each party depends only on k-local neighborhood
We show: Our reductions hold for arbitrary graph with “info-local” algorithm for spanning-tree neighbors
SLIDE 49 Remarks
- Even with known overall topology,
topology-hiding is still non-trivial
– Example – Cycles: nodes order may be sensitive.
SLIDE 50 Remarks
- Even with known overall topology,
topology-hiding is still non-trivial
– Example – Cycles: nodes order may be sensitive.
- Voting parallel broadcast:
– voting & mix-networks inspiration
SLIDE 51 Tool: PKCR-encryption
Public key encryption, which is:
Given pk and c [m]k Can produce fresh ciphertext c’ [m]k.
- 2. Privately key-commutative:
SLIDE 52 Tool: PKCR-encryption
Public key encryption, which is:
Given pk and c [m]k Can produce fresh ciphertext c’ [m]k.
- 2. Privately key-commutative:
PKCR-enc exists under DDH assumption.
SLIDE 53 Tool: PKCR-encryption
Public key encryption, which is:
Given pk and c [m]k Can produce fresh ciphertext c’ [m]k.
- 2. Privately key-commutative:
Notation: [m]k = Enck(m). PKCR-enc exists under DDH assumption.
SLIDE 54 Tool: PKCR-encryption
Public key encryption, which is:
Given pk and c [m]k Can produce fresh ciphertext c’ [m]k.
- 2. Privately key-commutative:
– Public keys are a group with efficiently computable k1*k2, k–1 Notation: [m]k = Enck(m). PKCR-enc exists under DDH assumption.
SLIDE 55 Tool: PKCR-encryption
Public key encryption, which is:
Given pk and c [m]k Can produce fresh ciphertext c’ [m]k.
- 2. Privately key-commutative:
– Public keys are a group with efficiently computable k1*k2, k–1 – Given secret key sk can efficiently: Notation: [m]k = Enck(m). PKCR-enc exists under DDH assumption.
SLIDE 56 Tool: PKCR-encryption
Public key encryption, which is:
Given pk and c [m]k Can produce fresh ciphertext c’ [m]k.
- 2. Privately key-commutative:
– Public keys are a group with efficiently computable k1*k2, k–1 – Given secret key sk can efficiently: a) Computed corresponding public-key pk(sk).
b)
Notation: [m]k = Enck(m). PKCR-enc exists under DDH assumption.
SLIDE 57 Tool: PKCR-encryption
Public key encryption, which is:
Given pk and c [m]k Can produce fresh ciphertext c’ [m]k.
- 2. Privately key-commutative:
– Public keys are a group with efficiently computable k1*k2, k–1 – Given secret key sk can efficiently: a) Computed corresponding public-key pk(sk).
b) AddLayer( [m]k , sk ) = [m]k*pk(sk)
Notation: [m]k = Enck(m). PKCR-enc exists under DDH assumption.
SLIDE 58 Tool: PKCR-encryption
Public key encryption, which is:
Given pk and c [m]k Can produce fresh ciphertext c’ [m]k.
- 2. Privately key-commutative:
– Public keys are a group with efficiently computable k1*k2, k–1 – Given secret key sk can efficiently: a) Computed corresponding public-key pk(sk).
b) AddLayer( [m]k , sk ) = [m]k*pk(sk) c) DelLayer ( [m]k , sk ) = [m]k*pk(sk)
Notation: [m]k = Enck(m). PKCR-enc exists under DDH assumption.
SLIDE 59 Our Techniques: Topology-Hiding Voting on Cycles
Phase 1. Aggregate Encrypted Votes: Phase 2. Mix & Decrypt:
4 3 5 1 2
SLIDE 60 Our Techniques: Topology-Hiding Voting on Cycles
Protocol Phase 1. Aggregate Encrypted Votes:
4 3 5 1 2
SLIDE 61 Our Techniques: Topology-Hiding Voting on Cycles
Protocol Phase 1. Aggregate Encrypted Votes:
4 3 5 1 2
v1
SLIDE 62 Our Techniques: Topology-Hiding Voting on Cycles
Protocol Phase 1. Aggregate Encrypted Votes:
4 3 5 1 2
k1 , v1
SLIDE 63 Our Techniques: Topology-Hiding Voting on Cycles
Protocol Phase 1. Aggregate Encrypted Votes:
4 3 5 1 2
k1 , [v1]k1
SLIDE 64 Our Techniques: Topology-Hiding Voting on Cycles
Protocol Phase 1. Aggregate Encrypted Votes:
4 3 5 1 2
k1 , [v1]k1
SLIDE 65 Our Techniques: Topology-Hiding Voting on Cycles
Protocol Phase 1. Aggregate Encrypted Votes:
4 3 5 1 2
k1 , [v1]k1 *k2
SLIDE 66 Our Techniques: Topology-Hiding Voting on Cycles
Protocol Phase 1. Aggregate Encrypted Votes:
4 3 5 1 2
k1*k2, [v1]k1*k2
SLIDE 67 Our Techniques: Topology-Hiding Voting on Cycles
Protocol Phase 1. Aggregate Encrypted Votes:
4 3 5 1 2
k1*k2, [v1]k1*k2 [v2]k1*k2
SLIDE 68 Our Techniques: Topology-Hiding Voting on Cycles
Protocol Phase 1. Aggregate Encrypted Votes:
4 3 5 1 2
k1*k2, [v1]k1*k2 [v2]k1*k2
SLIDE 69 Our Techniques: Topology-Hiding Voting on Cycles
Protocol Phase 1. Aggregate Encrypted Votes:
4 3 5 1 2
k=k1*k2*k3, [v1]k [v2]k [v3]k
SLIDE 70 Our Techniques: Topology-Hiding Voting on Cycles
Protocol Phase 1. Aggregate Encrypted Votes:
4 3 5 1 2
k=k1*…*k4*k5, [v1]k … [v5]k
…
SLIDE 71 Our Techniques: Topology-Hiding Voting on Cycles
Protocol Phase 1. Aggregate Encrypted Votes:
4 3 5 1 2
k=k1*…*k4*k5, [v1]k … [v5]k
SLIDE 72 Our Techniques: Topology-Hiding Voting on Cycles
Protocol Phase 2. Mix & Decrypt:
4 3 5 1 2
k=k1*…*k4*k5, [v1]k … [v5]k
SLIDE 73 Our Techniques: Topology-Hiding Voting on Cycles
Protocol Phase 2. Mix & Decrypt:
4 3 5 1 2
k=k1*…*k4*k5, [v1]k … [v5]k [v(1)]k … [v (5)]k
SLIDE 74 Our Techniques: Topology-Hiding Voting on Cycles
Protocol Phase 2. Mix & Decrypt:
4 3 5 1 2
k’=k1*…*k4, [v(1)]k’ … [v (5)]k’
SLIDE 75 Our Techniques: Topology-Hiding Voting on Cycles
Protocol Phase 2. Mix & Decrypt:
4 3 5 1 2
k’=k1*…*k4, [v(1)]k’ … [v (5)]k’
SLIDE 76 Our Techniques: Topology-Hiding Voting on Cycles
Protocol Phase 2. Mix & Decrypt:
4 3 5 1 2
k‘=k1*…*k4, [v(1)]k’ … [v (5)]k’
…
SLIDE 77 Our Techniques: Topology-Hiding Voting on Cycles
Protocol Phase 2. Mix & Decrypt:
4 3 5 1 2
k‘=k1*…*k4, [v(1)]k’ … [v (5)]k’ k1, [v’(1)]k1 … [v’(5)]k1
…
SLIDE 78 Our Techniques: Topology-Hiding Voting on Cycles
Protocol Phase 2. Mix & Decrypt:
4 3 5 1 2
k1, [v’(1)]k1 … [v’(5)]k1
SLIDE 79 Our Techniques: Topology-Hiding Voting on Cycles
Protocol Phase 2. Mix & Decrypt:
4 3 5 1 2
k1, [v’(1)]k1 … [v’(5)]k1
SLIDE 80 Our Techniques: Topology-Hiding Voting on Cycles
Protocol Phase 2. Mix & Decrypt:
4 3 5 1 2
v’’(1) … v’’(5)
SLIDE 81 Toy Problem:
Our Techniques: Reductions
SLIDE 82 Toy Problem: Settings: Arbitrary graph,
Our Techniques: Reductions
4 3 5 1 2
SLIDE 83 Toy Problem: Settings: Arbitrary graph, with cycle traversing the nodes.
Our Techniques: Reductions
4 3 5 1 2
SLIDE 84 Toy Problem: Settings: Arbitrary graph, with cycle traversing the nodes. Nodes know their local-view on cycle.
Our Techniques: Reductions
4 3 5 1 2 4
SLIDE 85 Toy Problem: Settings: Arbitrary graph, with cycle traversing the nodes. Nodes know their local-view on cycle. Observe: Topology-hiding voting on cycle-traversal Topology-hiding voting on underlying graph.
Our Techniques: Reductions
4 3 5 1 2 4
SLIDE 86 Toy Problem: Settings: Arbitrary graph, with cycle traversing the nodes. Nodes know their local-view on cycle. Observe: Topology-hiding voting on cycle-traversal Topology-hiding voting on underlying graph.
Our Techniques: Reductions
4 3 5 1 2
Reductions Outline (simplified):
- 1. Find cycle-traversal (local views) while hiding topology
- 2. Run topology-hiding voting on this cycle-traversal
4
SLIDE 87
Finding Cycle-Traversal
Questions: Does a cycle-traversal always exist?
SLIDE 88
Finding Cycle-Traversal
Questions: Does a cycle-traversal always exist? Can it be found efficiently?
SLIDE 89
Finding Cycle-Traversal
Questions: Does a cycle-traversal always exist? Can it be found efficiently? Can it be found topology-hiding?
SLIDE 90 Finding Cycle-Traversal
Questions: Does a cycle-traversal always exist? Can it be found efficiently? Can it be found topology-hiding? Yes, in every
(connected) graph.
SLIDE 91 Finding Cycle-Traversal
Questions: Does a cycle-traversal always exist? Can it be found efficiently? Can it be found topology-hiding? Yes, in every
(connected) graph.
Yes, in every
(connected) graph.
SLIDE 92 Finding Cycle-Traversal
Questions: Does a cycle-traversal always exist? Can it be found efficiently? Can it be found topology-hiding? Yes, in every
(connected) graph.
Yes, in every
(connected) graph.
Yes, in trees.
SLIDE 93 Finding Cycle-Traversal
Questions: Does a cycle-traversal always exist? Can it be found efficiently? Can it be found topology-hiding? Yes, in every
(connected) graph.
Yes, in every
(connected) graph.
Yes, in trees. Roughly, in small-circ.
SLIDE 94 Finding Cycle-Traversal in Trees
Convert-to-Cycle(N(v)=(u1,…,ud)) Forward messages arriving from ui to ui+1
SLIDE 95 Finding Cycle-Traversal in Trees
d e f b c a g h Convert-to-Cycle(N(v)=(u1,…,ud)) Forward messages arriving from ui to ui+1
SLIDE 96 Finding Cycle-Traversal in Trees
d e f b c a g h Convert-to-Cycle(N(v)=(u1,…,ud)) Forward messages arriving from ui to ui+1 1 2 4 3
SLIDE 97 Finding Cycle-Traversal in Trees
d e f b c a g h Convert-to-Cycle(N(v)=(u1,…,ud)) Forward messages arriving from ui to ui+1 1 2 4 3
SLIDE 98 Finding Cycle-Traversal in Trees
d e f b c a g h Convert-to-Cycle(N(v)=(u1,…,ud)) Forward messages arriving from ui to ui+1 1 2 4 3
SLIDE 99 Finding Cycle-Traversal in Trees
d e f b c a g h Convert-to-Cycle(N(v)=(u1,…,ud)) Forward messages arriving from ui to ui+1 1 2 4 3
SLIDE 100 Finding Cycle-Traversal in Trees
d e f b c a g h Convert-to-Cycle(N(v)=(u1,…,ud)) Forward messages arriving from ui to ui+1 1 2 4 3
SLIDE 101 Finding Cycle-Traversal in Trees
d e f b c a g h Convert-to-Cycle(N(v)=(u1,…,ud)) Forward messages arriving from ui to ui+1 1 2 4 3
SLIDE 102 Finding Cycle-Traversal in Trees
d e f b c a g h Convert-to-Cycle(N(v)=(u1,…,ud)) Forward messages arriving from ui to ui+1 1 2 4 3
SLIDE 103 Finding Cycle-Traversal in Trees
d e f b c a g h Convert-to-Cycle(N(v)=(u1,…,ud)) Forward messages arriving from ui to ui+1 1 2 4 3
SLIDE 104 Finding Cycle-Traversal in Trees
d e f b c a g h Convert-to-Cycle(N(v)=(u1,…,ud)) Forward messages arriving from ui to ui+1 1 2 4 3
SLIDE 105 Finding Cycle-Traversal in Trees
d e f b c a g h Convert-to-Cycle(N(v)=(u1,…,ud)) Forward messages arriving from ui to ui+1 1 2 4 3
SLIDE 106 Finding Cycle-Traversal in Trees
d e f b c a g h Convert-to-Cycle(N(v)=(u1,…,ud)) Forward messages arriving from ui to ui+1 d e f b c a g h a g d e e e 1 2 4 3
SLIDE 107 Finding Cycle-Traversal in Trees
d e f b c a g h Convert-to-Cycle(N(v)=(u1,…,ud)) Forward messages arriving from ui to ui+1 d e f b c a g h a g d e e e 1 2 4 3
SLIDE 108 Finding Cycle-Traversal in Trees
d e f b c a g h d e f b c a g h a g d e e e
What’s the cycle’s length?
1 2 4 3
SLIDE 109 Finding Cycle-Traversal in Trees
d e f b c a g h d e f b c a g h a g d e e e
What’s the cycle’s length?
1 2 4 3
SLIDE 110 Finding Cycle-Traversal in Trees
d e f b c a g h d e f b c a g h a g d e e e
What’s the cycle’s length?
- #(copies of v) = deg(v)
- Cycle’s length = sum of degrees
1 2 4 3
SLIDE 111 Finding Cycle-Traversal in Trees
d e f b c a g h d e f b c a g h a g d e e e
What’s the cycle’s length?
- #(copies of v) = deg(v)
- Cycle’s length = sum of degrees
= 2|E|
1 2 4 3
SLIDE 112 Finding Cycle-Traversal in Trees
d e f b c a g h d e f b c a g h a g d e e e
What’s the cycle’s length?
- #(copies of v) = deg(v)
- Cycle’s length = sum of degrees
= 2|E| = 2(n-1) (for trees)
1 2 4 3
SLIDE 113 Finding Cycle-Traversal in k-Circumference Graphs
Main Steps:
- I. Devise info-local algorithm for finding cycle-traversal.
SLIDE 114 Finding Cycle-Traversal in k-Circumference Graphs
Main Steps:
- I. Devise info-local algorithm for finding cycle-traversal.
- 1. Find spanning-tree T, info-locally
- 2. Find cycle-traversal on T.
SLIDE 115 Finding Cycle-Traversal in k-Circumference Graphs
Main Steps:
- I. Devise info-local algorithm for finding cycle-traversal.
- 1. Find spanning-tree T, info-locally
- 2. Find cycle-traversal on T.
- II. Hide-topology:
SLIDE 116 Finding Cycle-Traversal in k-Circumference Graphs
Main Steps:
- I. Devise info-local algorithm for finding cycle-traversal.
- 1. Find spanning-tree T, info-locally
- 2. Find cycle-traversal on T.
- II. Hide-topology:
Run “under-the-hood” using topology-hiding MPC: “find cycle-traversal & topology-hiding voting on it”
SLIDE 117 Finding Cycle-Traversal in k-Circumference Graphs
Main Steps:
- I. Devise info-local algorithm for finding cycle-traversal.
- 1. Find spanning-tree T, info-locally
- 2. Find cycle-traversal on T.
- II. Hide-topology:
Run “under-the-hood” using topology-hiding MPC: “find cycle-traversal & topology-hiding voting on it”
On k-neighborhood k-diameter graph
SLIDE 118
Conclusions & Subsequent Works
This work: Topology-hiding broadcast is feasible for large-diameter graphs, including:
cycles, trees, low-circumference graphs.
SLIDE 119
Conclusions & Subsequent Works
This work: Topology-hiding broadcast is feasible for large-diameter graphs, including:
cycles, trees, low-circumference graphs.
Open Questions (summer 2016): –Fail-stop / Active Adversary? –Other large-diameter graphs?
SLIDE 120 Peek Preview: Subsequent Works
- Ball-Boyle-Malkin-Moran (to appear):
Topology-hiding computation against fail-stop adversary for all graphs* using secure hardware
*with (unavoidable) bounded leakage
- Akavia-LaVigne-Moran (to appear):
Topology-hiding computation against passive adversary for all graphs without secure hardware!
SLIDE 121 Open Questions
Spring 2017
- Fail-stop / Active Adversary
without secure hardware?
(work in progress)
SLIDE 123
T u