The Dining Cryptographers Problem, introduced by David Chaum, addresses the challenge of maintaining anonymity in physical transactions where any transmission can be traced. The solution presented is unconditionally secure if based on one-time-use keys and cryptographically secure if based on public keys. The protocol involves three cryptographers dining at a restaurant where the bill is paid anonymously. Each cryptographer flips a coin and announces whether the coins they see are the same or different. If one cryptographer is paying, they state the opposite of what they see, ensuring that only the payer knows who is paying. This protocol ensures that non-payers cannot determine who is paying, even if they observe the outcomes of the coin flips.
The cryptographers further extend this protocol to allow multiple participants to make messages public untraceably. Each participant has a secret key bit in common with every other participant, and they output the sum of these key bits modulo two. If no participant transmits, the sum is zero; if one participant transmits, the sum is one. This method can be generalized to more participants and different fields, with potential collisions leading to retransmissions.
The underlying assumptions include modeling key-sharing arrangements as graphs, and the security is proven based on systems of linear equations. The model considers the possibility of participants colluding to violate the security of others, but the focus is on maintaining anonymity and untraceability.The Dining Cryptographers Problem, introduced by David Chaum, addresses the challenge of maintaining anonymity in physical transactions where any transmission can be traced. The solution presented is unconditionally secure if based on one-time-use keys and cryptographically secure if based on public keys. The protocol involves three cryptographers dining at a restaurant where the bill is paid anonymously. Each cryptographer flips a coin and announces whether the coins they see are the same or different. If one cryptographer is paying, they state the opposite of what they see, ensuring that only the payer knows who is paying. This protocol ensures that non-payers cannot determine who is paying, even if they observe the outcomes of the coin flips.
The cryptographers further extend this protocol to allow multiple participants to make messages public untraceably. Each participant has a secret key bit in common with every other participant, and they output the sum of these key bits modulo two. If no participant transmits, the sum is zero; if one participant transmits, the sum is one. This method can be generalized to more participants and different fields, with potential collisions leading to retransmissions.
The underlying assumptions include modeling key-sharing arrangements as graphs, and the security is proven based on systems of linear equations. The model considers the possibility of participants colluding to violate the security of others, but the focus is on maintaining anonymity and untraceability.