TY - GEN
T1 - Modeling privacy and tradeoffs in multichannel secret sharing protocols
AU - Pohly, Devin J.
AU - McDaniel, Patrick
N1 - Publisher Copyright:
© 2016 IEEE.
PY - 2016/9/29
Y1 - 2016/9/29
N2 - Privacy is an important aspect of network communications, but privacy protocols require an investment of network resources. For any such protocol to be of use, we need to understand quantitatively how much privacy to expect, as well as the tradeoff between privacy and other network properties, for any given configuration of networks and parameters. We develop a practical privacy measure and protocol model for multichannel secret sharing protocols which integrates privacy and measurable network properties, deriving optimality results for the overall privacy and performance of these protocols. After proving these results, we evaluate the effectiveness of our model by providing a reference implementation and comparing its behavior to the optimality results derived from the model. In our benchmarks, the behavior of this proof-of-concept protocol matched that which is predicted by our model, furthermore, our results demonstrate the feasibility of implementing secret sharing protocols which transmit at a rate within 3-4% of optimal. This model and its results allow us to understand quantitatively the tradeoffs between privacy and network performance in secret-sharing based protocols.
AB - Privacy is an important aspect of network communications, but privacy protocols require an investment of network resources. For any such protocol to be of use, we need to understand quantitatively how much privacy to expect, as well as the tradeoff between privacy and other network properties, for any given configuration of networks and parameters. We develop a practical privacy measure and protocol model for multichannel secret sharing protocols which integrates privacy and measurable network properties, deriving optimality results for the overall privacy and performance of these protocols. After proving these results, we evaluate the effectiveness of our model by providing a reference implementation and comparing its behavior to the optimality results derived from the model. In our benchmarks, the behavior of this proof-of-concept protocol matched that which is predicted by our model, furthermore, our results demonstrate the feasibility of implementing secret sharing protocols which transmit at a rate within 3-4% of optimal. This model and its results allow us to understand quantitatively the tradeoffs between privacy and network performance in secret-sharing based protocols.
UR - http://www.scopus.com/inward/record.url?scp=84994275652&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84994275652&partnerID=8YFLogxK
U2 - 10.1109/DSN.2016.41
DO - 10.1109/DSN.2016.41
M3 - Conference contribution
AN - SCOPUS:84994275652
T3 - Proceedings - 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2016
SP - 371
EP - 382
BT - Proceedings - 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2016
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 46th IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2016
Y2 - 28 June 2016 through 1 July 2016
ER -