We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Crypto and Privacy Village - Towards Usable Dining Cryptographer Networks with Howl

00:00

Formal Metadata

Title
Crypto and Privacy Village - Towards Usable Dining Cryptographer Networks with Howl
Title of Series
Number of Parts
335
Author
License
CC Attribution 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
Anonymous communication is important for dissidents, activists, whistleblowers, journalists, and any individuals that might be under surveillance by other parties. Dining Cryptographer Networks (DC-Nets) provide the strongest anonymity protections and the lowest possible latency of any current cryptographic solution. Unfortunately DC-Nets are faced with three fatal flaws that prevent their deployment in the real world: prohibitive bandwidth consumption, denial of service attacks (DoS) by participants, and low fault tolerance. In this talk, I will present Howl, our new open source project and decentralized anonymity network that solves these issues to make DC-Nets usable in the real world. We leverage a new aggregation protocol for bandwidth and fault tolerance issues, and use trusted execution environments (TEEs) to prevent DoS. All privacy is handled by the DC-net protocol and at no point does broadcast privacy rely on the trusted execution environment or aggregation network. BIO Tyler Kell is a Research Engineer at Cornell Tech in New York City. In a prior life, before becoming a researcher, he worked as a penetration tester and security consultant.
CryptographyUsability
Information privacyThermodynamisches SystemChainBlock (periodic table)Associative propertyScalability
Link (knot theory)HTTP cookiePlastikkarteConnected spaceGoogolSurface of revolutionInfinite conjugacy class propertyTrailInternetworkingInformation privacyMetadataDigital signalThermodynamisches System
Information privacy
Observational study
MereologyCryptographyComputer networkHypothesisLocal Group
NumberWeb pageLimit (category theory)
Proxy serverBroadcasting (networking)Exclusive orFunction (mathematics)
Dew pointProxy server
CollisionServer (computing)Band matrixThermodynamisches System
AlgorithmScheduling (computing)Division (mathematics)Vector spaceNumbering schemeExclusive orMessage passing
Gibbs-samplingCommunications protocolSimilarity (geometry)Exclusive orServer (computing)Client (computing)Message passingInformation privacyMilitary operationScale (map)Process (computing)InformationComponent-based software engineeringComputer networkTraverse (surveying)Vertex (graph theory)Type theoryRoot
BefehlsprozessorIntelThermodynamisches SystemCodeIntegrated development environment
IntelHash functionBefehlsprozessorCodeKey (cryptography)Personal digital assistantData managementDigital rights managementPoint cloudDigital signalRevision control
outputComputer networkForceCodeRevision controlClient (computing)
ComputerRule of inferenceCommunications protocolDenial-of-service attackInformation privacyIntelComputer hardwareComputer networkConsistency
Personal digital assistantDatabase transactionBroadcasting (networking)TwitterSocial software
Twitter
Component-based software engineeringMessage passingComputer networkTraverse (surveying)Exclusive orGibbs-samplingCommunications protocolSimilarity (geometry)Server (computing)Client (computing)Information privacyMilitary operationScheduling (computing)AlgorithmVector spaceDivision (mathematics)Numbering schemeCollisionBand matrixThermodynamisches SystemEquals signProxy serverBroadcasting (networking)Function (mathematics)
CollisionServer (computing)Band matrixThermodynamisches SystemExclusive orVector spaceAlgorithmScheduling (computing)Division (mathematics)Numbering schemeMessage passing