Professional Documents
Culture Documents
Stop Tracking Me: An Anti-Detection Type Solution For Anonymous Data
Stop Tracking Me: An Anti-Detection Type Solution For Anonymous Data
I.
INTRODUCTION
II.
BACKGROUND
NTRU 251
RSA 1024
ECC 163
public key(bits)
2008
1024
164
secret key(bits)
251
1024
163
plaintext
160
702
163
block(bits)
ciphertext
2008
1024
163
block(bits)
encrypt speed
3.6
0.9
0.07
(Mbits/sec)
decrypt speed
1.7
0.07
0.1
(Mbits/sec)
The NTRU encryption (NTRUEncrypt) scheme and its
variants such as NTRU-Like cryptosystems use the properties of
structured lattices to achieve high efficiency. In the NTRU
cryptosystem replacing with the some specific Euclidean
Domains yield NTRU-Like cryptosystems such as the ETRU
[24, 30]. These cryptosystems are faster and have smaller size of
keys for the same or better level of security than that of NTRU.
Moreover, because their security is conjectured to rely on the
hardness of certain lattice problems, which are not known to be
susceptible to quantum attack, NTRU is viewed as a quantumresistant cryptosystem. Now we can introduce the NTRU and its
Dedekind domain variants with high efficiency for our proposed
system.
III.
where 3 is a primitive
cube root of unity. In the above cryptosystems encryption and
decryption are the same as the NTRU, for this we just introduce
the NTRU cryptosystem but for each of which, we show an
example of element type.
Z[ 2 ] and the Eisenstein integers
Z[ x ]
N
x 1
, Rp
Z / pZ[ x ]
N
x 1
and Rq
Z / qZ[ x ]
N
x 1
f ( x ) a0 a1 x a2 x ... a N 1 x
2
N 1
| ai Z
in Rq , Fp ( x ) f ( x )
f ( x ) ( a0 b0 3 ) ( a1 b1 3 ) x ... ( a N 1 bN 1 3 ) x
N 1
f ( x ) : f i x i [ f 0 , f1 ,..., f N 1 ]1 N , f i Z
i 0
N 1
g ( x ) : g i x i [ g 0 , g1 ,..., g N 1 ]1 N , g i Z
i 0
N 1
h ( x ) : hi x i [h0 , h1 ,..., hN 1 ]1 N , hi Z
i 0
i 0
N 1
| ai , bi Z
N 1
| 3 ( 1
2
3i ; ai , bi
N 1
1; ai , bi Z
in R p
h( x ) Fq ( x ) * g ( x ) in Rq
hK : f i . g K i
|i
f ( x ) ( a0 b0 2 ) ( a1 b1 2 ) x ... ( a N 1 bN 1 2 ) x
N 1
f ( x ) T (d 1, d ) , g ( x ) T ( d , d )
Also we can compute the inverses as follows:
Fq ( x ) f ( x )
f i . g N K i
i K 1
fi .g j
i j K (mod N )
IV.
e( x ) ph( x ) * r( x ) m( x ) mod q
For decryption process we compute:
f ( x ) * e( x ) pg ( x ) * r( x ) f ( x ) * m( x ) mod q
Then we make centered lift to a ( x ) R and compute:
Fig. 1. Integrity of crypto types in the same data submission through the
Internet. The most powerful feature is to use type system for hemogenity
porpuses.
m( x ) Fp ( x ) * a ( x ) mod p
Z[ 3 ]
Z[i ][ x ]
N
x 1
, R3
Z[ 2 ][ x ]
N
x 1
, R4
Z[ 3 ][ x ]
x
(Type NTRU)
, :
(, )
(Type NL1) (Type NTRU-Like Z[i])
, : , :
(, , )
(Type NL2) (Type NTRU-Like Z [-2])
, : , :
(, , )
(Type ET) (Type ETRU)
, : , :
(, , )
(Val Array1) (Array for NT)
, :
(, ): ()
(Val Array2) (Array for NL1)
, :
(, ): ()
(Val Array3) (Array for NL2)
, :
(, ): ()
(Val Array4) (Array for ET)
, :
(, ): ()
(Type Product1) (Product for NT)
, :
:
(Type Product2) (Product for NL1)
, :
:
(Type Product3) (Product for NL2)
, :
:
(Type Product4) (Product for ET)
, :
:
Type NT maps a pair of A, B as a coefficient of a simple
polynomial. This type is typically compatible with NTRU crypto
system. NTRU encrypted data will be calculated, represented
and also submitted by this type system. Similarly, NL1 is a
representative of NTRU-Like crypto system with this difference
where A, B are coefficients of complex numbers. So mix should
be represented a complex number. NL2 and ET are crypto data
types respectively for NTRU-Like Z [-2] and ETRU crypto
systems. The shared region of these data types is behind of their
coefficients. These numbers only are used for key, encryption
and decryptions. They just need product type that is performed
through matrix and array data types. Each array type rule is
derived from F1 type system.
Another feature is subtyping. As a result of type pattern in
Internet anti-tracking area, it should be provided to substitute
encrypted pattern in a specific time. To use this, type system
should be able to change data type pattern. This work needs a
specific dimension of type system that called subtyping [17. 18].
Consider that we want to send NTRU data type and stochastic
system says that in this time we should use NTRU-Like pattern.
In such these positions when sending data are similar (as their
coefficients) we can switch to new crypto type under one
condition. The first data type should be had a subtyping
relationship with the new one. In this way, it is necessary to
migrate from subtype into its parent. Subtyping rules is shown
as follow. These rules help out to quickly shift between crypto
data types.
(Sub product1) (Subtyping NT & NL1)
<: , <:
<:
(Sub product2) (Subtyping NT & NL2)
<: , <:
<:
(Sub product3) (Subtyping NT & ET)
<: , <:
<:
Fig. 3. Type-probability diagram- T1, T2 and T3 are three time slice that T1
is minimum and T3 is maximum. This diagram indicates the probability of the
anti-detection that enhance with increasing number of crypto types.
Techniques
Antidetection
PCC [28]
TAL [14]
iTALx [15]
[10]
[11]
method
overhead
proof
middle
proof
middle
policy
high
policy
low
VI.
design
Type
system
compiler
level
Strong
type
Strong
type
privacy
quantum
resistant
high
yes
middle
no
middle
no
middle
no
[12]
[13]
[14]
CONCLUSION
[15]
[16]
[17]
[18]
[19]
[20]
[21]
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[22]
[23]
[24]
[25]
[26]
[27]
[28]
[29]
[30]
[31]