2001
DOI: 10.1007/3-540-44702-4_3
|View full text |Cite
|
Sign up to set email alerts
|

The Disadvantages of Free MIX Routes and How to Overcome Them

Abstract: There are different methods to build an anonymity service using MIXes. A substantial decision for doing so is the method of choosing the MIX route. In this paper we compare two special configurations: a fixed MIX route used by all participants and a network of freely usable MIXes where each participant chooses his own route. The advantages and disadvantages in respect to the freedom of choice are presented and examined. We'll show that some additional attacks are possible in networks with freely chosen MIX rou… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
101
0

Year Published

2005
2005
2016
2016

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 106 publications
(108 citation statements)
references
References 8 publications
0
101
0
Order By: Relevance
“…Even if all the above attacks are foiled, an adversary can mount a long-term intersection attack by correlating the times at which senders and receivers are active [7].…”
Section: The Intersection Attackmentioning
confidence: 99%
“…Even if all the above attacks are foiled, an adversary can mount a long-term intersection attack by correlating the times at which senders and receivers are active [7].…”
Section: The Intersection Attackmentioning
confidence: 99%
“…Among a variety of privacy and threat models that have been proposed for ACSs [18], [19], [20], [21], [22], the important case when the adversary knows all the senders (inputs) and receivers (outputs) would render the anonymous system useless under the timebased profiling attack at hand: it would be enough for this adversary to observe the messages generated by the target user. In other words, under the assumption of an external and global attacker [20], [23], an ACS would not be an appropriate approach to thwart an adversary who strives to profile users based on their online activity.…”
Section: Privacy-enhancing Technologies Against Time-based Profiling mentioning
confidence: 99%
“…Berthold et al [1] proposed to simply count the size ("cardinality") of the anonymity set: a larger list of candidates for the true sender or receiver corresponds to better anonymity. By taking the logarithm of the set size, base 2, this quantity can be expressed in bits.…”
Section: Measuring Anonymitymentioning
confidence: 99%