Distributing guess attack ccs2015 toolkit download

broken image
broken image

Our paper and code is available here: Ībstract Modern society is increasingly surrounded by, and is growing accustomed to, a wide range of Cyber-Physical Systems (CPS), Internet-of-Things (IoT), and smart devices.

broken image

Finally, I will discuss the results of our system simulation, including the communication and performance overhead of our system over other systems without this privacy guarantee, as well as with respect to the closest related work. Our architecture can be integrated with censorship-resistant publishing systems such as CROPS. In this talk, I will present our architecture that uses information-theoretic private information retrieval to efficiently render a server node incapable of determining what content was retrieved in a given request by a user. However, node operators are still exposed to the contents of queries.

broken image

Vasserman et al.'s censorship-resistant publishing system, CROPS, aimed at providing plausible deniability to server nodes by encrypting stored content. In order to incentivize these node operators of privacy-preserving DHTs, it is important to prevent exposing them to the data that is stored on the DHT and/or queried for. Abstract Peer-to-peer distributed hash tables (DHTs) rely on volunteers to contribute their computational resources, such as disk space and bandwidth.

broken image