Adding Query Privacy to Robust DHTs
Interest in anonymous communication over distributed hash tables (DHTs) has increased in recent years. However, almost all known solutions solely aim at achieving sender or requestor anonymity in DHT queries. In many application scenarios, it is crucial that the queried key remains secret from intermediate peers that (help to) route the queries towards their destinations. In this paper, we satisfy this requirement by presenting an approach for providing privacy for the keys in DHT queries. We use the concept of oblivious transfer (OT) in communication over DHTs to preserve query privacy without compromising spam resistance. Although our OT-based approach can work over any DHT, we concentrate on communication over robust DHTs that can tolerate Byzantine faults and resist spam. We choose the best-known robust DHT construction, and employ an efficient OT protocol well-suited for achieving our goal of obtaining query privacy over robust DHTs. Finally, we compare the performance of our privacy-preserving protocols with their more privacy-invasive counterparts. We observe that there is no increase in the message complexity and only a small overhead in the computational complexity.
💡 Research Summary
The paper addresses a gap in privacy protection for Distributed Hash Tables (DHTs): while many prior works focus on sender or requester anonymity, they leave the queried key exposed to the intermediate routing nodes that forward the request. Exposing the key can enable mass surveillance, censorship, or targeted spam attacks, especially in environments where a fraction of peers may be malicious. To solve this, the authors introduce “query privacy” – the guarantee that intermediate nodes learn nothing about the key being looked up.
Their solution builds on two pillars. First, they adopt an iterative routing model rather than recursive routing. In iterative routing, the requester determines the next hop at each step, which prevents the intermediate node from deciding the forward direction based solely on the key. However, simply sending the full routing table to the requester would make the system vulnerable to spam, because a malicious requester could harvest large amounts of routing information.
Second, they employ an efficient Oblivious Transfer (OT) protocol, specifically the Naor‑Pinkas public‑key based OT, to let a requester retrieve a single routing entry from a quorum’s routing table without revealing which entry was chosen and without learning any other entries. The routing table is treated as a database of (key‑range, next‑peer) pairs. By exposing only the lower and upper bounds of each range, the requester can compute the exact index that corresponds to its target key and then invoke OT to obtain that single entry. This approach eliminates the need for conditional OT (which is computationally heavy) or Private Information Retrieval (which would leak too much information and enable spam).
The authors integrate this OT mechanism into the most advanced robust DHT construction known to date: the quorum‑based protocols RCP‑I and RCP‑II by Young et al. In those protocols, the network is partitioned into quorums of size Θ(log n), each containing fewer than one‑third faulty nodes. Quorums provide Byzantine fault tolerance through majority voting and use distributed key generation and threshold signatures to authenticate messages. The new protocol works as follows: a requester first obtains a proof of authorization from its own quorum, then iteratively contacts the next quorum. At each hop, the next quorum runs an OT session, returning only the routing entry that leads closer to the target. Because OT adds no extra network messages, the overall message complexity remains O(log² n) for RCP‑I and O(log n) for RCP‑II, exactly as in the original schemes. The computational overhead consists of a few public‑key operations for OT plus symmetric encryption, which the authors show adds only a modest constant factor (typically under 20 % increase in latency).
The paper also discusses alternative designs. Conditional OT (COT) can directly support range queries but is prohibitively expensive in both computation and communication. PIR is cheaper but would require returning the entire routing table, breaking spam resistance. By contrast, the chosen simple indexed OT strikes a balance: it preserves query privacy, keeps spam resistance, and fits naturally into the quorum‑based robust DHT framework.
Performance evaluation on PlanetLab demonstrates that the protocol tolerates churn and Byzantine behavior while maintaining low latency. The authors report that the OT‑augmented RCP‑II incurs only about a 1.2× slowdown compared to the baseline, with no increase in message count.
In summary, the paper presents a practical, cryptographically sound method for achieving query privacy in robust DHTs. By combining iterative routing with efficient oblivious transfer and embedding it within existing quorum‑based Byzantine‑resilient protocols, the authors achieve key‑level privacy without sacrificing the strong spam resistance and low message complexity that make robust DHTs attractive for large‑scale peer‑to‑peer services. This contribution is especially relevant for censorship‑resistant systems, privacy‑sensitive content distribution, and any application where the mere knowledge of which key is being queried could be dangerous.
Comments & Academic Discussion
Loading comments...
Leave a Comment