2007
DOI: 10.1007/978-3-540-77366-5_9
|View full text |Cite
|
Sign up to set email alerts
|

A Model of Onion Routing with Provable Anonymity

Abstract: Onion routing is a scheme for anonymous communication that is designed for practical use. It has not been modeled formally, however, and therefore its anonymity guarantees have not been rigorously analyzed. We give an IO-automata model of an onion-routing protocol and, under possibilistic definitions, characterize the situations in which anonymity and unlinkability are guaranteed.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
50
0

Year Published

2010
2010
2017
2017

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 33 publications
(50 citation statements)
references
References 19 publications
0
50
0
Order By: Relevance
“…There have been analyses which focus on a particular AC protocol, such as Serjantov and Danezis (2002); Díaz (2006); Shmatikov and Wang (2006); Gierlichs et al (2008) for Mixnet, Bhargava and Palamidessi (2005); Andrés et al (2011) for DC-net, Díaz et al (2002); Shmatikov (2004) for Crowds, and Syverson et al (2000); Mauw et al (2004); Feigenbaum et al (2007a; for onion routing. Most of these study a particular anonymity property in a particular scenario and are not flexible enough to cover the emerging system-level attacks on the various AC protocols.…”
Section: Related and Prior Workmentioning
confidence: 99%
“…There have been analyses which focus on a particular AC protocol, such as Serjantov and Danezis (2002); Díaz (2006); Shmatikov and Wang (2006); Gierlichs et al (2008) for Mixnet, Bhargava and Palamidessi (2005); Andrés et al (2011) for DC-net, Díaz et al (2002); Shmatikov (2004) for Crowds, and Syverson et al (2000); Mauw et al (2004); Feigenbaum et al (2007a; for onion routing. Most of these study a particular anonymity property in a particular scenario and are not flexible enough to cover the emerging system-level attacks on the various AC protocols.…”
Section: Related and Prior Workmentioning
confidence: 99%
“…In [7], [1] and [14] the Onion-Routing (OR) [27] protocol is discussed; the authors present definitions for OR in the UC framework [8]. In [14], the model of Feigenbaum et al [13] is used. In [7] and [1] the authors further discuss the security properties required for OR cryptographic primitives, to achieve provable anonymity.…”
Section: Related Workmentioning
confidence: 99%
“…Independently, different cryptographic [7,3] and traffic-analysis models [12,13] have been developed for variants of onion routing. Whereas our work here does not consider traffic analysis explicitly, our in-depth results can be composed with meaningful models of traffic analysis.…”
Section: Introductionmentioning
confidence: 99%