A deeper look at Ariadne: a privacy-preserving network layer protocol

被引:0
作者
Fressancourt, Antoine [1 ]
Iannone, Luigi [1 ]
Kerichard, Mael [2 ]
机构
[1] Huawei Technol, Datacom Labs 2012, Paris, France
[2] ESIR, Rennes, France
关键词
Privacy; Privacy-enhancing technology; Onion routing;
D O I
10.1007/s12243-024-01017-5
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
We present a deeper analysis of Ariadne, a privacy-preserving network layer communication protocol that we introduced in Fressancourt and Iannone (2023). Ariadne uses a source routing approach to avoid relying on trusted third parties. In Ariadne, a source node willing to send anonymized network traffic to a destination uses a path consisting in nodes with which it has pre-shared symmetric keys. Temporary keys derived from those pre-shared keys are used to protect the communication's privacy using onion routing techniques, ensuring session unlinkability for packets following the same path. Ariadne enhances previous approaches to preserve communication privacy by introducing two novelties. First, the source route is encoded in a fixed size, sequentially encrypted vector of routing information elements, in which the elements' positions in the vector are pseudo-randomly permuted. Second, the temporary keys used to process the packets on the path are referenced using mutually known encrypted patterns. This avoids the use of an explicit key reference that could be used to de-anonymize the communications. This article enriches our previous presentation of Ariadne Fressancourt and Iannone (2023) with a set of formal proofs of its security properties. Besides, a performance evaluation of Ariadne's Rust implementation is presented to assess the ability of our protocol to protect privacy at the network layer in real-world use cases.
引用
收藏
页码:745 / 762
页数:18
相关论文
共 50 条
[31]   A Traceable Privacy-Preserving Transaction Protocol With Evolutionary Threshold Authentication [J].
Xie, Ninghai ;
Li, Jiguo ;
Lin, Chao ;
Zhang, Yichen ;
Shen, Jian .
IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (12) :20787-20799
[32]   Privacy-preserving compromised credential checking protocol for account protection [J].
Yu, Xiaopeng ;
Tang, Dianhua ;
Zhao, Zhen ;
Zhao, Wei .
COMPUTER STANDARDS & INTERFACES, 2024, 89
[33]   A privacy-preserving eHealth protocol compliant with the Belgian healthcare system [J].
De Decker, Bart ;
Layouni, Mohamed ;
Vangheluwe, Hans ;
Verslype, Kristof .
PUBLIC KEY INFRASTRUCTURE, 2008, 5057 :118-+
[34]   Event Invitations in Privacy-Preserving DOSNs Formalization and Protocol Design [J].
Rodriguez-Cano, Guillermo ;
Greschbach, Benjamin ;
Buchegger, Sonja .
PRIVACY AND IDENTITY MANAGEMENT FOR THE FUTURE INTERNET IN THE AGE OF GLOBALISATION, 2015, 457 :185-200
[35]   Efficient Verifiable Protocol for Privacy-Preserving Aggregation in Federated Learning [J].
Eltaras, Tamer ;
Sabry, Farida ;
Labda, Wadha ;
Alzoubi, Khawla ;
Malluhi, Qutaibah .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 :2977-2990
[36]   An efficient privacy-preserving comparison protocol in smart metering systems [J].
Nateghizad M. ;
Erkin Z. ;
Lagendijk R.L. .
Eurasip Journal on Information Security, 2016, 2016 (01)
[37]   SpreadMeNot : A Provably Secure and Privacy-Preserving Contact Tracing Protocol [J].
Tedeschi, Pietro ;
Bakiras, Spiridon ;
Di Pietro, Roberto .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (03) :2500-2515
[38]   Privacy-Preserving Assessment of Social Network Data Trustworthiness [J].
Dai, Chenyun ;
Rao, Fang-Yu ;
Truta, Traian Marius ;
Bertino, Elisa .
PROCEEDINGS OF THE 2012 8TH INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING (COLLABORATECOM 2012), 2012, :97-106
[39]   A logical framework for privacy-preserving social network publication [J].
Hsu, Tsan-Sheng ;
Liau, Churn-Jung ;
Wang, Da-Wei .
JOURNAL OF APPLIED LOGIC, 2014, 12 (02) :151-174
[40]   Privacy-preserving SimRank over Distributed Information Network [J].
Chu, Yu-Wei ;
Tai, Chih-Hua ;
Chen, Ming-Syan ;
Yu, Philip S. .
12TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM 2012), 2012, :840-845