2002
DOI: 10.1007/3-540-36415-3_3
|View full text |Cite
|
Sign up to set email alerts
|

From a Trickle to a Flood: Active Attacks on Several Mix Types

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
119
0

Year Published

2005
2005
2017
2017

Publication Types

Select...
5
3
1

Relationship

2
7

Authors

Journals

citations
Cited by 120 publications
(119 citation statements)
references
References 5 publications
0
119
0
Order By: Relevance
“…Thus, in order to achieve any meaningful anonymity guarantee, we need that f < n − 1. In other words, we do not consider the n − 1 attack [55] in this work. Finally, for termination, we assume that the bulletin board is honest.…”
Section: Threat Modelmentioning
confidence: 99%
“…Thus, in order to achieve any meaningful anonymity guarantee, we need that f < n − 1. In other words, we do not consider the n − 1 attack [55] in this work. Finally, for termination, we assume that the bulletin board is honest.…”
Section: Threat Modelmentioning
confidence: 99%
“…A substantial part of this literature consists of papers evaluating the effectiveness of mix-based anonymity systems in a theoretical setting; e.g., [6,11,18]. Such work often involves assumptions suchas"users pick their communication partners uniformly at random" which help with the mathematics of calculating anonymity, and hence aid our understanding and intuition, but do not necessarily hold in practice.…”
Section: Related Workmentioning
confidence: 99%
“…For example, a delay-and-playout technique (traffic mixing) is used in [2] [14]. Serjantov et al [17] classify traffic mixing strategies into two major categories-simple MIXes and pool MIXes. Both categories use either one threshold or both: a message pool size n and/or a time period t that a message stays in the pool.…”
Section: B Related Workmentioning
confidence: 99%
“…These threshold based schemes are vulnerable to either flooding attacks, where the adversary sends its own n-1 messages to flush a pool of size n; or trickle attacks, where the adversary blocks all the incoming messages except the target one until the mix node sends it out after t; or the two blended. Various mixing schemes have been proposed to reduce the success ratio of such attacks [17].…”
Section: B Related Workmentioning
confidence: 99%