“…Several formal definitions and frameworks have been proposed for reasoning about secure information flow analysis (e.g., [7,8,19]), side-channel analysis (e.g., [13]) and anonymity. Our work follows a recent trend in the analysis of anonymity protocols directed to the application of informationtheoretic notions (e.g., [1,2,[4][5][6]9,12,15,17,18]), whereby the work closer to the present one are those by Reiter and Ruben [16], Halpen and O'Neill [10], Chatzikokolakis and Palamidessi [3], and a recent paper Hamadou et al [12].…”