Topology-Hiding Computation on All Graphs

Adi Akavia, Rio LaVigne, Tal Moran

Research output: Contribution to journalArticlepeer-review


A distributed computation in which nodes are connected by a partial communication graph is called topology hiding if it does not reveal information about the graph beyond what is revealed by the output of the function. Previous results have shown that topology-hiding computation protocols exist for graphs of constant degree and logarithmic diameter in the number of nodes (Moran–Orlov–Richelson, TCC’15; Hirt et al., Crypto’16) as well as for other graph families, such as cycles, trees, and low circumference graphs (Akavia–Moran, Eurocrypt’17), but the feasibility question for general graphs was open. In this work, we positively resolve the above open problem: we prove that topology-hiding computation is feasible for all graphs under either the decisional Diffie–Hellman or quadratic residuosity assumption. Our techniques employ random or deterministic walks to generate paths covering the graph, upon which we apply the Akavia–Moran topology-hiding broadcast for chain graphs (paths). To prevent topology information revealed by the random walk, we design multiple graph-covering sequences that, together, are locally identical to receiving at each round a message from each neighbor and sending back a processed message from some neighbor (in a randomly permuted order).

Original languageEnglish
Pages (from-to)176-227
Number of pages52
JournalJournal of Cryptology
Issue number1
StatePublished - 1 Jan 2020

Bibliographical note

Publisher Copyright:
© 2019, International Association for Cryptologic Research.


  • Broadcast
  • Networks
  • Random walks
  • Secure Multiparty Computation
  • Topology-Hiding computation

ASJC Scopus subject areas

  • Software
  • Computer Science Applications
  • Applied Mathematics


Dive into the research topics of 'Topology-Hiding Computation on All Graphs'. Together they form a unique fingerprint.

Cite this