Irving Street Functionality

This is supposed to be a blog.

recent posts
posted 24 Feb, 2022

Vuvuzela: Scalable Private Messaging Resistant to Traffic Analysis

author Jelle van den Hooff, David Lazar, Matei Zaharia, and Nickolai Zeldovich
title Vuvuzela: Scalable Private Messaging Resistant to Traffic Analysis
howpublished SOSP’15, Oct. 4–7, 2015, Monterey, California, USA.
year 2015
month October
where MIT CSAIL, MA, USA

Summary

All messages are E2EE, so message contents is a priori confidential and authentic.

The protocol is based on “dead drops”.

Within that framework, there are three kinds of things an adversary could learn, each with its own protection/mitigation:

  1. What users participate each round?
    • Every user participates every round, sending dummy messages as needed.
    • All messages are capped/padded to a fixed length.
  2. Who talks to whom?
    • Dead-drop addresses are re-randomized each round, based on a secret known to the communicating parties. Thus, the address a party accesses doesn’t itself leak any information.
    • Multiple servers are arranged as a mixnet/daisy-chain/bucket-brigade. Each server independently randomizes the messages it relays (obfuscates which ones came from which source).
    • Messages are encrypted onion-like for each server, so a single honest server anywhere in the stack suffices.
  3. How many messages are exchanged each round?
    • Roughly speaking this is an independent concern because of the possibility that the top/innermost server is corrupt.
    • There are technically two variables to consider here: the number of successful communications and the number of unsuccessful communications.
    • Cover traffic is added sufficient to provide (ε,δ)-DP on these two variables.
    • Because only one honest server is assumed, every server must add this much cover traffic independently.

The authors show that this is (somewhat) practical to do, with (somewhat) good performance and (reasonably) good values for ε and δ, even over hundreds of thousands of rounds of communication. They also claim that the practical depletion-rate of the privacy-budget, for users who are publicly known to only participate in a minority of rounds, is much lower than nominal.

Contributions

Although the system builds on top of very many pre-existing tools, the particular combination/design is novel. The authors claim that this is the first performant system to give good differential privacy of communication meta-data across many rounds of communication .

They also did an empirical test of the system’s performance, and show that, if scaled to millions of users, it can reasonably handle not-quite-real-time communication (like emails) for <$1/user/year.

Critique

Open questions