Anonymity Preserving Byzantine Vector Consensus

被引:3
|
作者
Cachin, Christian [1 ]
Collins, Daniel [2 ,3 ]
Crain, Tyler [2 ]
Gramoli, Vincent [2 ,3 ]
机构
[1] Univ Bern, Bern, Switzerland
[2] Univ Sydney, Sydney, Australia
[3] Ecole Polytech Fed Lausanne, Lausanne, Switzerland
来源
基金
澳大利亚研究理事会;
关键词
Anonymity; Byzantine agreement; Consensus; Vector consensus; Distributed computing; TRAFFIC ANALYSIS; CRYPTOSYSTEMS; BROADCAST;
D O I
10.1007/978-3-030-58951-6_7
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Collecting anonymous opinions has applications from whistleblowing to complex voting where participants rank candidates by order of preferences. Unfortunately, as far as we know there is no efficient distributed solution to this problem. Previous solutions either require trusted third parties, are inefficient or sacrifice anonymity. In this paper, we propose a distributed solution called the Anonymised Vector Consensus Protocol (AVCP) that reduces the problem of agreeing on a set of anonymous votes to the binary Byzantine consensus problem. The key idea to preserve the anonymity of voters-despite some of them acting maliciously-is to detect double votes through traceable ring signatures. AVCP is resilient-optimal as it tolerates up to a third of Byzantine participants. We show that our algorithm is correct and that it preserves anonymity with at most a linear communication overhead and constant message overhead when compared to a recent consensus baseline. Finally, we demonstrate empirically that the protocol is practical by deploying it on 100 machines geo-distributed in three continents: America, Asia and Europe. Anonymous decisions are reached within 10 s with a conservative choice of traceable ring signatures.
引用
收藏
页码:133 / 152
页数:20
相关论文
共 50 条
  • [31] L-Cover: Preserving Diversity by Anonymity
    Zhang, Lei
    Wang, Lingyu
    Jajodia, Sushil
    Brodsky, Alexander
    SECURE DATA MANAGEMENT, PROCEEDINGS, 2009, 5776 : 158 - +
  • [32] Distribution-preserving k-anonymity
    Wei, Dennis
    Ramamurthy, Karthikeyan Natesan
    Varshney, Kush R.
    STATISTICAL ANALYSIS AND DATA MINING, 2018, 11 (06) : 253 - 270
  • [33] Improved yoking proof protocols for preserving anonymity
    Ham, HyoungMin
    Lee, JongHyup
    Song, JooSeok
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2018, 17 (04) : 379 - 393
  • [34] A Lightweight and Secure Anonymity Preserving Protocol for WBAN
    Almuhaideb, Abdullah M.
    Alqudaihi, Kawther S.
    IEEE ACCESS, 2020, 8 : 178183 - 178194
  • [35] Anonymity-Preserving Location Data Publishing
    Girish, Lingappa
    Cai, Ying
    2008 PROCEEDINGS OF 17TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, VOLS 1 AND 2, 2008, : 560 - 565
  • [36] A survey on anonymity for privacy preserving data mining
    Zhang, X. X.
    Liu, Q.
    Liu, D. M.
    Xie, W.
    INFORMATION SCIENCE AND ELECTRONIC ENGINEERING, 2017, : 343 - 346
  • [37] Improved yoking proof protocols for preserving anonymity
    HyoungMin Ham
    JongHyup Lee
    JooSeok Song
    International Journal of Information Security, 2018, 17 : 379 - 393
  • [38] A Survey on Anonymity-based Privacy Preserving
    Wang, Jian
    Luo, Yongcheng
    Jiang, Shuo
    Le, Jiajin
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 1073 - 1076
  • [39] A remote authentication scheme preserving user anonymity
    Chien, HY
    Chen, CH
    AINA 2005: 19th International Conference on Advanced Information Networking and Applications, Vol 2, 2005, : 245 - 248
  • [40] Privacy preserving pattern based anonymity (k, P) anonymity in time series data
    Mayil Vel Kumar, P.
    Karthikeyan, M.
    Journal of Computational and Theoretical Nanoscience, 2015, 12 (12) : 5524 - 5529