**Topology-Hiding Computation on all Graphs**

*Adi Akavia and Rio LaVigne and Tal Moran*

**Abstract: **A distributed computation in which nodes are connected by a partial communication graph is called topology-hiding if it does not reveal information about the graph beyond what is revealed by the output of the function. Previous results have shown that topology-hiding computation protocols exist for graphs of constant degree and logarithmic diameter in the number of nodes [Moran-Orlov-Richelson, TCC'15; Hirt \etal, Crypto'16] as well as for other graph families, such as cycles, trees, and low circumference graphs [Akavia-Moran, Eurocrypt'17], but the feasibility question for general graphs was open.

In this work we positively resolve the above open problem: we prove that topology-hiding computation is feasible for all graphs under either the Decisional Diffie-Hellman or Quadratic-Residuosity assumption.

Our techniques employ random-walks to generate paths covering the graph, upon which we apply the Akavia-Moran topology-hiding broadcast for chain-graphs (paths). To prevent topology information revealed by the random-walk, we design multiple random-walks that, together, are locally identical to receiving at each round a message from each neighbors and sending back processed messages in a randomly permuted order.

**Category / Keywords: **cryptographic protocols / topology-hiding, topology-hiding computation, broadcast

**Date: **received 31 Mar 2017, last revised 24 Jan 2018

**Contact author: **rio at mit edu

**Available format(s): **PDF | BibTeX Citation

**Note: **We have a few new results, including being able to use an additional assumption (QR) to get topology-hiding computation, and the use of more general exploration sequences instead of random walks in our protocol.

**Version: **20180124:201836 (All versions of this report)

**Short URL: **ia.cr/2017/296

**Discussion forum: **Show discussion | Start new discussion

[ Cryptology ePrint archive ]