Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Fingerprint Scheduling @ Crypto Working Group, Utrecht, May 2015

Fingerprint Scheduling @ Crypto Working Group, Utrecht, May 2015

This talk explains Fingerprint scheduling, a scheduling algorithm for Dining Cryptographers networks, and outlines its characteristics compared to other scheduling algorithms.

I gave this talk at the Cryptography Working Group meeting in May 2015. See http://www.win.tue.nl/eipsi/cwg/aank%20mei%202015.pdf for the full program.

Moritz Neikes

May 22, 2015
Tweet

More Decks by Moritz Neikes

Other Decks in Research

Transcript

  1. Charlie Alice Bob 0 1 1 0 1=1 0 1=1

    1 1=0 0 1 1 0 1=0 1 result 13/70
  2. Charlie Alice Bob 0 1 1 0 1=1 0 1=1

    1 1=0 0 0 1 sending 14/70
  3. Charlie Alice Bob 0 1 1 0 1=1 0 1=1

    1 1=0 0 0 1 0 0=1 1 sending 15/70
  4. Charlie Alice Bob 100110 100110 111110 100110 001010 100110 110100

    110100 001010 111110 101100 010010 000000 111110 101100 010010 100110 001010 101100 110100 100110 010010 17/70
  5. Charlie Alice Bob 100110 100110 111110 100110 001010 100110 110100

    110100 001010 111110 101100 111000 101010 111110 101100 111000 100110 001010 101100 110100 100110 010010 18/70
  6. Charlie Alice Bob 100110 100110 100110 001010 100110 110100 110100

    001010 111110 101100 111000 001011 011111 011111 101100 111000 100110 001010 101100 110100 100110 010010 collision 19/70
  7. Herbivore http://www.cs.cornell.edu/People/egs/papers/herbivore-tr.pdf small sub-nets More Slots! doesn't scale Goel, Robson,

    Polte, Sirer 2003 Divide-and-conquer not relevant Disconnected users: more slots than needed Inactive users: ~1000 #users small anonymity set :( 27/70
  8. Alice: Bob: Charlie: 3 7 2 1...12 slots 1 1

    1 12 3 12/3 =4 3 0 2 1 0 1 5 2 33/70
  9. Alice: Bob: Charlie: 3 7 2 1...12 slots 1 1

    1 12 3 12/3 =4 3 0 2 1 0 1 5 2 5/2 =2 0 0 2 0 0 1 2 1 34/70
  10. Alice: Bob: Charlie: 3 7 2 1...12 slots 1 1

    1 12 3 12/3 =4 3 0 2 1 0 1 5 2 5/2 =2 0 0 2 0 0 1 2 1 2 public 35/70
  11. Alice: Bob: Charlie: 3 7 2 1...12 slots 1 1

    1 12 3 12/3 =4 3 0 2 1 0 1 5 2 5/2 =2 0 0 2 0 0 1 2 1 7 3 2 public 36/70
  12. Alice: Bob: Charlie: 3 3 11 1...12 slots 1 1

    1 17 3 17/3 =5 3 3 0 1 1 0 6 2 6/2 =3 3 3 0 1 1 0 6 2 3 collision 11 37/70
  13. Pfitzmann's algorithm http://dud.inf.tu-dresden.de/sirene/publ/Pfit_88_0.pdf Inactive users: Andreas Pfitzmann, 1990 Disconnected users:

    _6.pdf ... Utilizes message collisions no additional costs breaks protocol No undetectable conflicts 40/70
  14. Alice: Bob: Charlie: 3 7 2 1...12 slots 1 1

    1 12 3 12/3 =4 3 0 2 1 0 1 5 2 5/2 =2 0 0 2 0 0 1 2 1 41/70
  15. Herbivore doesn't scale Goel, Robson, Polte, Sirer 2003 Pfitzmann's algorithm

    Andreas Pfitzmann, 1990 breaks on disconnect 43/70
  16. Dissent http://dedis.cs.yale.edu/dissent/files/dissent.pdf Corrigan-Gibbs, Ford 2010 Shuffle Guaranteed sending Bulk variable

    message length big computational overhead fixed message length side-channel 46/70
  17. Herbivore doesn't scale Goel, Robson, Polte, Sirer 2003 Pfitzmann's algorithm

    Andreas Pfitzmann, 1990 breaks on disconnect Dissent Corrigan-Gibbs, Ford 2010 hard to implement breaks on disconnect 47/70
  18. Collisions during reservation? 101100 011010 110110 000000 Detectable Undetectable 100100

    011010 110110 001000 More slots! More bits! Fingerprint scheduling 49/70
  19. Fingerprint scheduling More bits per slot 2 bits for now

    More choices Flip left / right / both bit(s) detect more collisions 50/70
  20. 10.10.10 10.11.01 01.11.01 11.00.10 01.01.00 01.10.10 Alice: Bob: Charlie: 10

    10 01 previously III. converged! 01.10.10 000000 000000 000000 1 3 2 56/70
  21. 100110 START PICK FREE SLOT COLLISION? TOSS COIN FREE SLOT?

    100110 BACK OFF NO YES MOVE YES STAY NO PICK FINGERPRINT 58/70
  22. 100110 START PICK FREE SLOT COLLISION? TOSS COIN FREE SLOT?

    100110 BACK OFF NO YES MOVE YES STAY NO PICK FINGERPRINT 10.00.00 00.00.10 11.01.10 01.01.00 59/70
  23. 1 2 3 4 5 6 7 8 9 10

    11 12 13 14 15 16 inactive 1,000 users 16 slots 60/70
  24. 1 2 3 4 5 6 7 8 9 10

    11 12 13 14 15 16 inactive 1,000 users 16 slots 61/70
  25. Fingerprint scheduling Iterate Discussion bits b slots, choose one s

    Inactive users: no additional costs Disconnected users: compensated immediately 63/70
  26. Guaranteed Sending Adapt to load balance Equal throughput Catch disruptors

    False accusation Computational overhead Disconnected users PFITZMANN INHERENT EXTERNAL PROTOCOL LITTLE RESTART HERBIVORE ESTIMATED NONE IRRELEVANT FINGERPRINT INHERENT LITTLE COMPENSATED DISSENT SHUFFLE BULK MANUAL INHERENT NEVER LARGE MASSIVE RESTART EXTERNAL PROTOCOL EXTERNAL PROTOCOL 66/70
  27. Fingerprint scheduling Scales with # active users Fast, even in

    large networks Stable under disconnections Simple to implement No computational overhead [email protected] No more war about editors 67/70
  28. Traditional alg. Bit-map protocols Tokens (slotted) ALOHA CSMA Carrier Sense

    Multiple Access Collision resolution Collision-free doesn't scale inefficient no anonymity 68/70
  29. Alice Bob Charlie 100110 100110 100110 001010 100110 110100 Fred

    George 100110 110111 100110 011001 100110 101110 69/70
  30. Alice Bob Charlie 100110 100110 100110 001010 100110 110100 Fred

    George 100110 011001 100110 101110 70/70