2017
DOI: 10.29012/jpc.v7i2.651
|View full text |Cite
|
Sign up to set email alerts
|

AnoA: A Framework for Analyzing Anonymous Communication Protocols

Abstract: Abstract. Anonymous communication (AC) protocols such as the widely used Tor network have been designed to provide anonymity over the Internet to their participating users. While AC protocols have been the subject of several security and anonymity analyses in the last years, there still does not exist a framework for analyzing these complex systems and their different anonymity properties in a unified manner.In this work we present AnoA: a generic framework for defining, analyzing, and quantifying anonymity pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 39 publications
0
7
0
Order By: Relevance
“…While ODoH provides strong cryptographic security properties for individual queries, it has limited defences against correlation attacks. Backes et al [4] formalise this as Sender Anonymity, i.e., whether an attacker can identify the sender of a message with some nonnegligible probability. As discussed in Das et al [24,25], resisting correlation attacks in the presence of an adversary that can observe both endpoints requires added latency or bandwidth overhead.…”
Section: Correlation Attacksmentioning
confidence: 99%
“…While ODoH provides strong cryptographic security properties for individual queries, it has limited defences against correlation attacks. Backes et al [4] formalise this as Sender Anonymity, i.e., whether an attacker can identify the sender of a message with some nonnegligible probability. As discussed in Das et al [24,25], resisting correlation attacks in the presence of an adversary that can observe both endpoints requires added latency or bandwidth overhead.…”
Section: Correlation Attacksmentioning
confidence: 99%
“…In this work we present an impossibility result for sender anonymity of ACNs that allow messages to be sent, to mix, and to confuse a potential adversary with dummy messages. We measure sender anonymity based on the AnoA framework [25] as the inability of an adversary to distinguish between two different senders of their own choosing, say, Alice and Bob. We start by showing, with an intuitive counter-example, why the existing anonymity trilemma by Das et al does not sufficiently capture this space of protocols.…”
Section: Overviewmentioning
confidence: 99%
“…We define (sender) anonymity by a game between a challenger (controlling the protocol) and a global passive adversary, following the AnoA framework [25]. The challenger receives all protocol parameters and a description of how users want to send messages (the user distribution), as well as a challenge bit b that influences which of two adversarially chosen senders actually sends a particular challenge message.…”
Section: Anonymity Definitionmentioning
confidence: 99%
See 1 more Smart Citation
“…In 2013, Backes et al [102] proposed a framework for analyzing anonymous communication protocols, AnoA, in which a formal definition of anonymity was given based on a novel generalization of differential privacy. The security notion in the framework is based on interacting Turing Machines.…”
Section: E Formalization From the View Of Differential Privacymentioning
confidence: 99%