Printer Friendly

Topology-hiding broadcast based on NTRUEncrypt.

1. Introduction

The basic problem of multi-party computation was phrased well over thirty years ago. Following the seminal works of Yao and Goldreich [2,3], numerous advances of MPC have been made ranging from general completeness results [4,5] to efficient solutions for specific problems [6-8]. As Goldwasser predicted, the field of multi-party computation is today where public-key cryptography was ten years ago [9], its competence of corporative computing with inputs concealed made it an extremely powerful tool and rich theory for real-life usage. Albeit secure multi-party computations are usually carried out on computer networks, one important question is always neglected: MPC over an underlying communication network whose structure might be, in itself, sensitive information. Taking social networks or vehicular networks for example, revealing the network topology could have severe privacy implications on nodes relationships or locations.

Aiming at the goal of designing an MPC protocol which computationally hides the underlying network topology, a seminal paper presented by Tal Moran [1] in early 2015 formally defined topology-hiding MPC in both indistinguishability game-based and simulation-based ways. Briefly speaking, if we model a network by a graph G = (V, E) that is not fully connected, the game-based definition can be summarized as follows:

An adversary corrupts A [subset] V and sends two network topologies [G.sub.0], [G.sub.1] on vertices V. These graphs must be so that the neighborhoods of A are the same. The challenger then picks [G.sub.b] at random and returns the collective view of the parties in A resulting from the execution of the protocol on [G.sub.b]. The adversary outputs b' and wins if b' = b. We say a protocol is secure against chosen topology attack if no static and computationally bounded adversary can win the above game with probability negligibly greater than if it simply guesses b'. For more details, a through reading of abovementioned paper [1] is highly recommended.

Besides the definition of topology-hiding MPC, a conceptual broadcast protocol which is secure as long as the adversary does not corrupt any whole neighborhoods of the network graph is also presented in [1]. However, Tal Moran simply assumed that there exists a secret-sharing scheme which can be used to hide the sensitive information among nodes in local neighborhood and left its realization behind. Inspired by Tal Moran's idea on topology-hiding broadcast, we exploit the semi-homomorphic property of modified NTRUEncrypt and devise an efficient topology-hiding broadcast protocol.

2. Related Work

In fact, the interplay between multi-party computation and networking is disregarded by most of cryptographic MPC literatures thus we refer the works in [1] as first contributions in such topic. Besides that, the only literature we can find related to topology-hiding MPC is that of Hinkelmann and Jakoby [10] who focused on the information theoretic setting. They observed that two nonadjacent nodes [v.sub.i] and [v.sub.j] in G can communicate with each other only when some intermediate [v.sub.z] knows that it sits between [v.sub.i] and [v.sub.j]. The observation implies that, in the information theoretic setting, any MPC protocol must inherently leak information about G to an adversary. Fortunately, they also derived a positive result: given some minimal amount of network information to leak, one can construct an MPC protocol which leaks no further information [10]. Leverage on such interesting possibility and Tal Moran's innovative idea, we caught the sight of NTRUEncrypt as an instrument to actualize our scheme.

As for NTRUEncrypt [11], it is a relatively new public key cryptosystem which is developed around 1996 by three mathematicians. Up till 2013, literatures can be found that introduce new parameters to resist currently known attacks and increase its computation power [12-14]. Since both encryption and decryption use only simple polynomial multiplications in NTRUEncrypt, it is more competitive to be used in resource-constraint applications such as mobile devices or smart-cards. And that is the reason we exploit it as our building block besides its semi-homomorphic property.

The rest of the paper is organized as follows. We first describe the system model and a naive broadcast protocol where topology-hiding is not achieved yet. Then we give some preliminaries about the modified NTRUEncrypt in section 4. In section 5, a topology-hiding MPC protocol, which is secure even if the adversary is capable of corrupt any part of the network graph, is presented. It is worth mentioning that our scheme dose not strictly comply with Tal Moran's [1] framework and deviates from it to some extents. Security analyses and performance evaluations are given in section 6. And we conclude the paper in section 7.

3. System model and topology-exposure problem

We model a network by an undirected graph G = (V, E) which is not fully connected. For [v.sub.i] [member of] V, its closed neighborhood is denoted as N([v.sub.i]) = {[v.sub.j] [member of] V, ([v.sub.i], [v.sub.j]) [member of] E} [union] {[v.sub.i]}. A static and computationally bounded adversary that controls some subset of parties is considered in our model. The adversary is semi-honest and sees all the messages sent by the honest parties for each round.

In order to flood a broadcast to the whole network, we first describe a naive broadcast protocol for a message which can be represented as a bit string:

1. In the first round, the sender broadcast the message m to all of its neighbors, and every other party broadcasts a string of 0s to their own neighbors instead. Note that all these broadcasts are of equal lengths.

2. As for successive rounds, every party computes the bitwise OR of all broadcasts received from their neighbors, and sends the result back to them.

After k rounds, it is obvious that any node which is k hops or less from the sender will be sending the message, and after diam(G) rounds all parties will agree on message m , where diam(G) is the diameter of the graph.

However, though the broadcast functionality is realized in this naive protocol, the network topology would be exposed on it: every party can easily figure out its distance from the sender by counting the rounds until it receives a non-zero bit string, and even the direction where the sender lies in can be deduced by noting which neighbor first sent a non-zero message. In order to sort the topology-exposure problem out, we fall back on a semi-honest server which helps the neighboring nodes to securely compute the bitwise OR of the broadcasts and keep intermediate outcomes concealed. The topological structure is also confidential to the server in our scheme and more details can be found in section 5.

4. Preliminaries on NTRUEncrypt

In our protocol, the NTRU encryption algorithm which is based on the shortest vector problem in a lattice is exploited for semi-homomorphic computation. It works on a truncated polynomial ring R = Z[X]/([X.sup.N] - 1) with convolution multiplication and all polynomials in the ring have integer coefficients and degree at most N - 1:

[alpha] = [[alpha].sub.0] + [[alpha].sub.1] [X.sup.1] + [[alpha].sub.2][X.sup.2] + ... + [[alpha].sub.N-2] [X.sup.N-2] + [[alpha].sub.N-1] [X.sup.N-1]. (1)

For each system, three integer parameters (N, p, q) are specified, where N represents the maximal degree N - 1 for all polynomials in the truncated ring R, p and q are two moduli, respectively. It is always assumed that N is prime, q is much larger than p, and p is coprime to q. To send a secret message to the receiver, two key polynomials f and g with degree at most N _ 1and with coefficients in {-1, 0, 1} must be generated in advance. The polynomial f must also satisfy the additional requirement that the inverses modulo q and modulo p exist, which means that f x [f.sub.p] = 1 mod p and f x [f.sub.q] = 1 mod q must hold. If the chosen f is not invertible, we have to go back and try another f. After that, we preserve f and [f.sub.p] as secret key, while compute h = p[f.sub.q]g as the public key.

In order to encrypt a message m , we represent it as a binary or ternary string and put it in the form of a polynomial whose coefficients belong to {-1, 0, 1}. Then we randomly choose a binding polynomial r with small coefficients and achieve the ciphertext as

c = r x h + m(mod q). (2)

During the decryption process, the receiver first multiplies the encrypted message c and part of his private key f. After she obtains

[alpha] = f x c(mod q) = p x r x g + f x m, (3)

whose coefficients lie within the interval [-q/2, q/2] since the polynomials r, g, f, m and prime p all have coefficients that are small compared to q, she can compute

b = a(mod p) = f x m(mod p) (4)


m = [f.sub.p] x b(mod p) = f x [f.sub.p] x m(mod p) (5)

to decrypt the ciphertext.

We note that if we constrain the polynomial coefficients of m in the interval [-p/2, p/2] (instead of {-1, 0, 1}) with a sufficiently large modulus p, the plaintext can also be recovered properly. Thus we exploit this property and devise a semi-homomorphic scheme which can be used in our topology-hiding protocol.

Denote the coefficients of two bit strings [m.sub.1], [m.sub.2] as ([a.sub.1,1], [a.sub.1,2], ... [a.sub.1,N-2], [a.sub.1,N-x]) and ([[a.sub.2, 1], [a.sub.2,2], ... [a.sub.2,N-2], [a.sub.2,N-1]) where [a.sub.1,i] + [a.sub.2,i] [member of] [-p/2, p/2] for 0 [less than or equal to] i [less than or equal to] N - 1, the sum of their ciphertext can be written as

[c.sub.1] + [c.sub.2] = ([r.sub.1] + [r.sub.2]) x p x [f.sub.g] x g + [m.sub.1] + [m.sub.2] (mod q). (6)

Then we decrypt the result as mentioned above, we obtain the added plaintext [m.sub.1] + [m.sub.2] (mod p) whose coefficients are ([a.sub.1,1] + [a.sub.2,1], [a.sub.1,2] + [a.sub.2,2], ... [a.sub.1,N-2] + [a.sub.2,N-2], [a.sub.1,N-1] + [a.sub.2,N- 1]).

5. Topology-hiding broadcast protocol

In this section we describe a protocol for topology-hiding broadcast against a semi-honest adversary. There are three objectives in designing our protocol: (1) the topology can not be revealed even if the adversary is capable of corrupting any part of the network graph; (2) despite the employment of a semi-honest third party, he can not derive any topology information from what he received; (3) even with prerequisite of hiding intermediate results of OR-operation, all nodes will be aware of the message at end. For clarity, we formulate our protocol in three phases.

Initialization phase: This phase aims at distributing secret shares among neighboring nodes and the server. First, we figure out a key-pair of NTRUEncrypt, assign the private key SK to the server while publish the public key PK to all parties. A positive integer d which is greater than the degree of any node is also allocated to all nodes as well as the server. Then for each node [v.sub.i], we assign it a randomly chosen polynomial [k.sup.l.sub.i] whose degree is at most N - 1 with coefficients belong to {-1, 0, 1}. Assuming that there exists a polynomial [k.sup.l'.sub.i] where [summation over (j[member of]N[[v.sub.i]])] [k.sup.1.sub.j] + [k.sup.1'.sub.i] (mod p) = 0 and N[[v.sub.i]] stands for the closed neighborhood of node [v.sub.i], we deliver [k.sup.l'.sub.i] to [v.sub.i] as well. It is worth noting that the polynomials [k.sup.1.sub.i] and [k.sup.1'.sub.i] denote the initial values of parameters [k.sup.t.sub.i] and [k.sup.t'.sub.i] which will be updated in each step of Broadcast phase.

Broadcast phase: In this phase, the aforementioned naive broadcast protocol is improved to a topology-hiding version. Depending on the depth of broadcast(only broadcast to a limited range, e.g. local information query) or network diameter diam(G) (broadcast to the whole network), a series of rounds will be executed in the following manner.

For each round, we assume that the intermediate result of OR-operation as in naive broadcast protocol is represented as [m.sub.i] for node [v.sub.i]. It is worth noting that such intermediate result should be kept secret from any nodes or server except for the first and last rounds. Therefore, any node [v.sub.i] is only endowed with an encrypted version [E.sub.PK] ([m.sub.i] + [k'.sub.i]) as the input of current round t. As for the first round, we encode the original broadcast message as a polynomial [m.sub.i] = [m.sub.s] whose coefficients belong to {0, 1} for sender [v.sub.s] and assign polynomials [m.sub.i] = 0 to any other nodes [v.sub.i] (i [not equal to] s), thus all nodes can trivially figure out their inputs as [E.sub.PK] ([m.sub.i + [k.sup.1.sub.i]) by homomorphically combining [E.sub.PK]([m.sub.i]) with [E.sub.PK] ([k.sup.1.sub.i]).

At the beginning of each round t, every node [v.sub.i] broadcasts its message [E.sub.PK] ([m.sub.i] + [k.sup.t.sub.i]) to neighboring nodes and homomorphically sum its receives (including its own message) together with [E.sub.PK] ([dk.sup.t+1.sub.i]) and [E.sub.PK]([k.sup.t'.sub.i]) as


where all nodes exchange the coefficients of polynomial [k.sup.t.sub.i] in a same permutation to upgrade it to be [k.sup.t+1.sub.i]. Then it sends the result to the server who can recover the plaintext as


since [summation over (j[member of]N[[v.sub.i]])] [k.sup.t.sub.j] + [k.sup.t'.sub.i] (mod p) = 0. We noticed that the coefficients of I m} are seated within {0, 1, ..., deg([v.sub.i]) + 1}, where deg([v.sub.i]) denotes the degree of node [v.sub.i]. So the OR-operation of corresponding coefficients for neighboring m j can be calculated as [[summation over (j[member of]N[[v.sub.i]])] [m.sub.j]/d] ([h] stands for the ceiling operation of coefficients in polynomial h).

However, after decoding the ciphertext, server can easily deduce the distance between sender and the current node, by discerning the existence of fractional part in ([summation over (j[member of]N[[v.sub.i]])] [m.sub.j] + [dk.sup.t+1.sub.i])/d.

To sort this out, node [v.sub.i] forge other n ciphertexts [E.sub.PK]([m.sup.c.sub.i] + [dk.sup.c.sub.i]), c = {1, 2, ..., n} applying some fake sums of intermediate results [m.sup.c.sub.i] and parameters [k.sup.c.sub.i]. Herein, the polynomials [m.sup.c.sub.i] are chosen as 0 with half probability, whereas for any other [m.sup.c.sub.i], we uniformly choose a number from {1, 2, ..., d} and assign it to part of the polynomial's coefficients. [k.sup.c.sub.i] are fabricated by permute the coefficients of polynomials [k.sup.t+1.sub.i]. After that, we permute the counterfeits together with the genuine one and send the results to the server. Server then decrypts the results and reseals them as [E.sub.PK]([m.sup.c.sub.i] + [dk.sup.c.sub.i]/d), c = {0, 1, ..., n}, in permuted order, where [E.sub.PK] ([([m.sup.o.sub.i] + [dk.sup.o.sub.i]) = [E.sub.PK] ([([summation over (j[member of]N[[v.sub.i]])][m.sub.j] + [dk.sup.t+1.sub.i])/d]) stands for the genuine one. Since server is unaware of the permutation, he is incapable of deciding whether the broadcast reached current node in terms of the ceiling operation.

After received the resealed information from sever, node [v.sub.i] pick up the genuine one as the input of next round and we consider [[summation over (j[member of]N[[v.sub.i]])] [m.sub.j]/d] in ciphertext as new [m.sub.i]. We should also remember that p must be large enough so that any coefficient of [summation over (j[member of]N[[v.sub.i]])] [m.sub.j] + [dk.sup.t+1.sub.i] resides within [-p/2, p/2]. In the end of current round, we also upgrade [k.sup.t'.sub.i] by permuting its coefficients in the same way as updating [k.sup.t.sub.i], making sure that [summation over (j[member of]N[[v.sub.i]])] [k.sup.t+1.sub.j] + [k.sup.t+1'.sub.i] (mod p) = 0.

End phase: In order to make sure that any node is aware of the broadcasted message at end, we describe the final round as a separate phase. In the last round e, each node homomorphically sum its receives as


where t = e stands for the last round, without appending [E.sub.PK] ([dk.sup.e+1.sub.i]) to it. Then it sends the ciphertext directly to server who decodes it as [[summation over (j[member of]N[[v.sub.i]])][m.sub.j]/d] and sends the result back. In terms of the received polynomial, node can trivially derive the original message from it.

The detailed protocol is shown in Table 1.

6. Performance and Security analysis

As for the performance of our proposed protocol, we implement it with an agent-based modeling tool which is called Repast Symphony [15]. Considering that our scheme is an instantiation of topology-hiding broadcast for the first time, we also realize the protocol described in Section 4 of paper [1] by RSA cryptosystem and NTRUEncrypt (since it is the only similar protocol we know for topology-hiding broadcasting) for comparison. For more details, a thorough reading of [1] is highly recommended. In fact, though our protocol is inspired by Moran's seminal work [1], it differentiates from his framework such as secret shares and cryptography scheme. It is also worth mentioning that Moran simply ignored the issue on how to deal with the recovered key from neighboring key shares. Therefore, we assign the tasks of reconstructing the secret key as well as encryption-decryption operations of his protocol to a server, which implies that the topology will be explored to a third-party. In the simulation, nodes are connected to constitute a Watts-Strogatz network [16] for reality. Some parameters are chosen as in Table 2.

We implement the simulator on a PC machine equipped with Intel Core i5-2430M 2.40GHz processor and 3GB memories. The computation burden and communication overhead of server for each round per node is estimated in average of 50 tests.

As shown in Fig. 1, it is obvious that our scheme is preferable than Moran's protocol especially when average node degrees are bigger. This is due to the reason that the decryption-encryption operations in Moran's protocol must be executed deg([v.sub.i]) + 1 (number of nodes in closing neighborhood of node [v.sub.i]) times, while the execution times of NTRU algorithm in our scheme is constant as n + 1. Even if we employed NTRUEncrypt to realize Moran's protocol for efficiency, the degradation of its performance is still conspicuous as average degree increases. Note that though homomorphic sum and counterfeits forging must be carried out in each node before sending in our scheme, it is unnecessary to worry about the extra burden since polynomial computations are efficient. When the scale of network is large, we can deploy a series of servers to distribute the computational burden to localized agents. As for communication overhead, each node firstly broadcasts its current intermediate result to neighbors in our scheme, which are N[log.sub.2] q bits, and the permuted polynomials subsequently submitted to server are (n + 1)N[log.sub.2] q bits in all. The messages send back from server are the some amount as it received. Assuming that the key length of RSA or NTRUEncrypt are K bits (K is equal to 1024 for RSA and N(2 + [[log.sub.2] p]) = 3123 for NTRUEncrypt in our experiment) in Moran's protocol, sever must retrieve at least (deg([v.sub.i]) + 1)K bits to recovery the private key for node vi, which is bitwise exclusive OR of secret shares. Meanwhile, the ciphertexts it sends and receives are both (deg([v.sub.i]) + 1)K bits when implemented by RSA and (deg([v.sub.i]) + 1)N [[log.sub.2] q] bits when implemented by NTRUEncrypt. Fig. 2 illustrated that, due to longer ciphertexts (also longer key shares in NTRUEncrypt version of Moran's scheme), protocols based on NTRUEncrypt brought about more communication overhead. However, since the communication overhead only relates to the number of counterfeits in our protocol, it will not increase along with average degree as in Moran's scheme.

There after, we give two theorems about the security of our scheme.

Theorem 1 Our proposed protocol is topology hiding as long as any part of the network is corrupted.

Proof. We leverage on the game-based security definition of topology-hiding proposed by Moran [1] for our proof.

Let G be a set of graphs. Let [PI] be our protocol running over any of the communication graphs in G where each node [v.sub.i] gets an input [m.sub.i] [member of] {0, [m.sub.s]}. Herein, ms stands for the input of broadcaster.

Assuming that an adversary A arbitrarily chooses a corrupt subset S, inputs [m.sub.j] for the corrupted parties [v.sub.j] [member of] S and, for k [member of]{0, 1}, two graphs [G.sub.k] = ([V.sub.k], [E.sub.k]) [member of] G, such that S [subset] [V.sub.0] [intersection] [V.sub.1] and [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII]. Then it outputs (S; [G.sub.0], [G.sub.1]; {[m.sub.j]}) to a competitor C. If S [not subset] [V.sub.0] [intersection] [V.sub.1] or if some input [m.sub.j] is invalid C wins automatically.

Now C chooses a random b [member of] {0, 1} and runs [PI] in the communication graph [G.sub.b]. A receives the collective view of all parties in S during the protocol execution.

Finally A must output b' [member of]{0, 1}. If b' = b we say that A wins the security game. Otherwise A loses.

According to the forementioned game rule, the game-based security definition of topology-hiding can be described as

Definition 1 We say that an MPC protocol [PI] is Indistinguishable under Chosen Topology Attack (INDCTA secure) over G if for any probabilistic polynomial time bounded adversary A there exists negligible function [mu](*), such that for every n it holds

[absolute value of (Pr(A Wins) - 1/2)] < [mu](n). (10)

As for our protocol, the collective view of adversary A after gaming can be represented as a triad [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII], where [E.sub.PK]([m.sub.i] + [k.sup.t.sub.i]) stand for the encrypted intermediate messages computed by the server or received from the closed neighborhood of corrupted nodes. Since the adversary is unaware of the secret key and NTRUEncrypt is probabilistic, he can not reveal these ciphertexts or even tell which of them correspond to a same plaintext. That is to say, adversary A can not win the game by distinguishing [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] other than simply guessing and our scheme is topology-hiding in game-based definition.

Compared with the naive protocol described in section 3, our scheme prevents any corrupted nodes from deducing the distance or direction of broadcaster since they are ignorant of whether the intermediate messages are zero or not.

Theorem 2 The server is unaware of any information about the network topology.

Proof. The server receives a series of permuted intermediate results except for the last round. Since the genuine message is obscured with both zero and non-zero fake messages and server is unaware of the permutation order, it can not tell whether the genuine result is zero or not by discerning the existence of fractional part during ceiling operation. Moreover, server is also incapable of tracking the position of genuine messages in permutations since [k.sup.c.sub.i] is introduced and updated periodically. Therefore, server gains no more information than any node dose.

It is also worth mentioning that, the private key of any node is secretly shared within its neighbors in Moran's protocol, so the identities of neighbors can not be hidden from it and the network must be static. Meanwhile, Moran didn't address the problem of how to deal with the recovered secrets key, which means it can be reused by some party once figured out. However, the abovementioned defects do not exists in our scheme.

7. Conclusion and further work

The main contribution of this paper consists on the introduction of a specific topology-hiding broadcast protocol. We revised the naive scheme described in [1] and resort to the semi-homomorphic property of NTRUEncrypt as well as secret sharing to prevent any party from deducing topology information by intermediate results. By performance and security analysis, we illustrated the merits of our protocol compared with Moran's scheme. However, our protocol will be no longer secure if the server colludes with any node, thus we consider its solution as a further work. Moreover, we didn't take malicious models into account in our scheme, and we leave the solutions of topology-hiding broadcast in malicious environments to the future.

The paper is subsidized by Natural Science Foundation Project of CQ CSTC(cstc2011jjA30010) and Science Foundation of Chongqing Jiaotong University (20101cjc016).


[1] T. Moran, "Topology-hiding computation," in Proc. of 12th Theory of Cryptography Conference, pp. 23-25, 2015. Article (CrossRef Link)

[2] A. C. C. Yao, "Protocols for secure computations," in Proc. of FOCS, vol. 82, pp. 160-164, 1982. Article (CrossRef Link)

[3] O. Goldreich, S. Micali and A. Wigderson, "How to play ANY mental game," in Proc. of the nineteenth annual ACM conference on Theory of computing, pp. 218-229, 1987. Article (CrossRef Link)

[4] M. Ben-Or, S. Goldwasser and A. Wigderson, "Completeness theorems for noncryptographic fault-tolerant distributed computations," in Proc. of 20th Annual ACM Symposium on Theory of Computing, pp. 1-10, 1988. Article (CrossRef Link)

[5] R. Canetti, "Universally composable security: A new paradigm for cryptographic protocols," in Proc. of 42nd Annual Symposium on Foundations of Computer Science, pp. 136-147, 2001. Article (CrossRef Link)

[6] M. Naor, B. Pinkas and R. Sumner, "Privacy preserving auctions and mechanism design," in Proc. of 1st ACM Conf on Electronic Commerce, pp. 129-139, 1999. Article (CrossRef Link)

[7] R. Cramer, I. Damgard and Y. Ishai, "Share conversion, pseudorandom secret-sharing and applications to secure computation," in Proc. of the Second Theory of Cryptography Conference, pp. 342-362, 2005. Article (CrossRef Link)

[8] P. Bogetoft, K. Boye, H. Neergaard-Petersen and K. Nielsen, "Reallocating sugar beet contracts: Can sugar production survive in Denmark?" European Review of Agricultural Economics, vol. 34, no. 1, 2007. Article (CrossRef Link)

[9] S. Goldwasser, "Multi-party computations: Past and present," in Proc. of 16th annual ACM Symposium on Principles of distributed computing, pp. 21-24, 1997. Article (CrossRef Link)

[10] M. Hinkelmann, A. Jakoby, "Communications in unknown networks: Preserving the secret of topology," Theor. Comput. Sci., vol 384, no. 2, pp. 184-200, 2007. Article (CrossRef Link)

[11] J. Hoffstein, J. Pipher and J. H. Silverman, "NTRU: A Ring Based Public Key Cryptosystem," Lecture Notes in Computer Science, vol. 1423, pp. 267-288, 1998. Article (CrossRef Link)

[12] J. Hermans, F. Vercauteren and B. Preneel, "Speed Records for NTRU," Lecture Notes in Computer Science, vol. 5985, pp. 73-88, 2010. Article (CrossRef Link)

[13] D. Stehle, R. Steinfeld, "Making NTRU as secure as worst-case problems over ideal lattices," in Proc. of EUROCRYPT 2011. LNCS, vol. 6632, pp. 27-47, 2011. Article (CrossRef Link)

[14] J. W. Bos, K. Lauter, J. Loftus and M. Naehrig, "Improved security for a ring-based fully homomorphic encryption scheme," in Proc. of IMACC 2013, LNCS, vol. 8308, pp. 45-64, 2013. Article (CrossRef Link)

[15] M. J. North, E. Tatara, N. T. Collier and J. Ozik, "Visual Agent-based Model Development with Repast Simphony," in Proc. of the Agent 2007 Conference on Complex Interaction and Social Emergence, 2007. Article (CrossRef Link)

[16] D. J. Watts, S. H. Strogatz, "Collective dynamics of 'small-world' networks," Nature, vol. 393, no. 6684, pp. 440-442, 1998. Article (CrossRef Link)

Bo Mi received the P. H. degree in computer science in Chongqing University in 2009. His current research interests include multi-party computation, data privacy and secure vehicular ad hoc networks.

Dongyan Liu received the P. H. degree in civil engineering in Chongqing University in 1993. His current research interests include intelligent transportation and topology analysis.

Bo Mi (1,2), Dongyan Liu (2)

(1) College of Information Science and Engineering, Chongqing Jiaotong University Chongqing, 400074-China [e-mail:]

(2) College of Civil Engineering, Chongqing University Chongqing, 400044-China [e-mail:]

* Corresponding author: Bo Mi

Received July 10, 2015; revised October 13, 2015; accepted October 28, 2015; published January 31, 2016

Table 1. Protocol at node [v.sub.i] for each round t, where [m.sub.i]
stands for the current plaintext message and [MATHEMATICAL EXPRESSION

Node [v.sub.i]                       Server

Secret shares:

PK: public key                       PK: public key

d : an integer bigger than           SK: private key
maximum node degree

[k.sup.t'.sub.i]: secret             d : an integer bigger than maximum
polynomial, upgraded  as             node degree
previously defined

[k.sup.t'.sub.i]: secret
polynomial, upgraded the same
way as [k.sup.t.sub.i]

Protocol for each round []:

(1) Broadcast [E.sub.PK]
([m.sub.i] + [k.sup.t.sub.l]) to
its neighbors

(2) upon receiving broadcasts
from its closed neighbors
[v.sub.j], [v.sub.i] upgrade
[k.sup.t.sub.i] and computes

(3) [v.sub.i] permutes the result
with counterfeits

[E.sub.PK] ([m.sup.c.sub.i] +
[dk.sup.c.sub.i]), c = {1,2, ...,    (4) Decrypt the received messages,
n} and submits them to the server.   reseal them

                                     [E.sub.PK] ([([m.sup.c.sub.i] +
                                     [dk.sup.c.sub.i])/d]), c = {0,1,
                                     ..., n}, and send them back in
                                     receiving order.

(5) pick up the genuine one as
current intermediate result and
upgrade [k.sup.t'.sub.i].

In the last round t = e, [v.sub.i] computes [MATHEMATICAL EXPRESSION
NOT REPRODUCIBLE IN ASCII] instead and send it directly to the server,
ASCII] and directly send it back.

Table 2. Simulation parameters

parameter                                  values

Maximal degree of polynomials N - 1        346
Modulus q                                  512
Modulus p                                  83
Number of counterfeit ciphertexts n        6
RSA key length                             1024
Number of nodes                            500
COPYRIGHT 2016 KSII, the Korean Society for Internet Information
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 2016 Gale, Cengage Learning. All rights reserved.

Article Details
Printer friendly Cite/link Email Feedback
Author:Mi, Bo; Liu, Dongyan
Publication:KSII Transactions on Internet and Information Systems
Article Type:Report
Date:Jan 1, 2016
Previous Article:Simpler efficient group signature scheme with verifier-local revocation from lattices.
Next Article:GreenIoT architecture for Internet of Things applications.

Terms of use | Privacy policy | Copyright © 2018 Farlex, Inc. | Feedback | For webmasters