Proceedings of the 12th ACM Workshop on Workshop on Privacy in the Electronic Society 2013
DOI: 10.1145/2517840.2517850
|View full text |Cite
|
Sign up to set email alerts
|

On the limits of provable anonymity

Abstract: We study provably secure anonymity. We begin with rigorous definition of anonymity against wide range of computationally bounded attackers, including eavesdroppers, malicious peers, malicious destinations, and their combinations. Following [21], our definition is generic, and captures different notions of anonymity (e.g., unobservability and sender anonymity).We then study the feasibility of ultimate anonymity: the strongest-possible anonymity requirements and adversaries. We show there is a protocol satisfyin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(28 citation statements)
references
References 39 publications
0
28
0
Order By: Relevance
“…We formalize this in the following definition, where we also use '_' to declare that this part of a tuple can be any value. 11 11 E.g. ∃(u, m, _) ∈ r will be true iff ∃u : ∃(u, m, u ) ∈ r.…”
Section: Protocol-dependent: Sessionsmentioning
confidence: 99%
See 1 more Smart Citation
“…We formalize this in the following definition, where we also use '_' to declare that this part of a tuple can be any value. 11 11 E.g. ∃(u, m, _) ∈ r will be true iff ∃u : ∃(u, m, u ) ∈ r.…”
Section: Protocol-dependent: Sessionsmentioning
confidence: 99%
“…Gelernter and Herzberg [11] extend Hevia's framework to include corrupted participants. Additionally, they show that under this strong adversary an ACN protocol achieving the strongest notions exists.…”
Section: Gelernter's Frameworkmentioning
confidence: 99%
“…Building on the work of Hevia and Micciancio (2008), Gelernter and Herzberg published, concurrently with this work, an expressive framework that extends the work of Hevia and Micciancio with active adversaries that adaptively send inputs (Gelernter and Herzberg, 2013). They apply their methodology to obtain an impossibility result for a strong combination of sender anonymity and unobservability, which they coin "ultimate anonymity".…”
Section: Related and Prior Workmentioning
confidence: 99%
“…Previous mathematically founded analyses abstract the Tor network by ignoring characteristics of Tor, such as the path selection algorithm, the varying entrusted bandwidth of different Tor nodes, or the user's requested ports [6,[15][16][17][18]21]. However, these real-life characteristics of Tor significantly influence a user's anonymity, which renders the previously proven bounds inaccurate.…”
Section: Introductionmentioning
confidence: 99%
“…The first line of work assumes a worst case adversary and proves rigorous anonymity bounds for Tor users [6,[15][16][17][18]21]. These pieces of work, however, abstract the Tor network by ignoring characteristics of Tor that significantly influence a user's anonymity, such as the path selection algorithm, the varying entrusted bandwidth of different Tor nodes, or the user's requested ports.…”
Section: Introductionmentioning
confidence: 99%