Express: Lowering the Cost of Metadata-hiding Communication with Cryptographic Privacy

11/20/2019
by   Saba Eskandarian, et al.
0

Existing systems for metadata-hiding messaging that provide cryptographic privacy properties have either high communication costs, high computation costs, or both. In this paper, we introduce Express, a metadata-hiding communication system that significantly reduces both communication and computation costs. Express is a two-server system that provides cryptographic security against an arbitrary number of malicious clients and one malicious server. In terms of communication, Express only incurs a constant-factor overhead per message sent regardless of the number of users, whereas previous cryptographically-secure systems Pung and Riposte had communication costs proportional to roughly the square root of the number of users. In terms of computation, Express only uses symmetric key cryptographic primitives and makes both practical and asymptotic improvements on protocols employed by prior work. These improvements enable Express to increase message throughput, reduce latency, and consume over 100x less bandwidth than Pung and Riposte, dropping the end to end cost of running a realistic whistleblowing application by 6x.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/14/2019

XRD: Scalable Messaging System with Cryptographic Privacy

Even as end-to-end encrypted communication becomes more popular, private...
research
09/10/2018

Tandem: Securing Keys by Using a Central Server While Preserving Privacy

Users' devices, e.g., smartphones or laptops, are typically incapable of...
research
10/08/2020

Concealed Communication in Online Social Networks

Online social networks are used frequently by many people: Staying in co...
research
03/11/2021

Practical Encrypted Computing for IoT Clients

Privacy and energy are primary concerns for sensor devices that offload ...
research
07/25/2020

SOTERIA: In Search of Efficient Neural Networks for Private Inference

ML-as-a-service is gaining popularity where a cloud server hosts a train...
research
11/04/2021

CryptoNite: Revealing the Pitfalls of End-to-End Private Inference at Scale

The privacy concerns of providing deep learning inference as a service h...
research
05/31/2021

Proactive Provenance Policies for Automatic Cryptographic Data Centric Security

Data provenance analysis has been used as an assistive measure for ensur...

Please sign up or login with your details

Forgot password? Click here to reset