scispace - formally typeset
Open AccessProceedings Article

Systems for Anonymous Communication

TLDR
An overview of the eld of anonymous communications, from its establishment in 1981 by David Chaum to today, and key systems are presented categorized according to their underlying principles: semitrusted relays, mix systems, remailers, robust & veriable mixes, and onion routing systems.
Abstract
We present an overview of the eld of anonymous communications, from its establishment in 1981 by David Chaum to today. Key systems are presented categorized according to their underlying principles: semitrusted relays, mix systems, remailers, robust & veriable mixes, and onion routing systems. We include extended discussions of the threat models and usage models that dierent schemes provide, and the tradeos between the security properties oered and the communication characteristics dierent systems support.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements

TL;DR: This paper presents a comprehensive framework to model privacy threats in software-based systems and provides an extensive catalog of privacy-specific threat tree patterns that can be used to detail the threat analysis outlined above.
Proceedings ArticleDOI

Unobservable communication over fully untrusted infrastructure

TL;DR: Pung is a key-value store where clients deposit and retrieve messages without anyone-- including Pung's servers--learning of the existence of a conversation, based on private information retrieval, which makes more practical for the setting with new techniques.
Journal ArticleDOI

Information privacy

Jan Camenisch
- 01 Dec 2012 - 
TL;DR: It is argued that applications on the Internet should be built with privacy and security as a mandatory requirement, then an overview of the state of the art in privacy-enhancing mechanisms is provided, and a roadmap towards a privacy- enhanced digital world is concluded, pointing out a number of challenges that need to be solved.
Proceedings ArticleDOI

Trust-based anonymous communication: adversary models and routing algorithms

TL;DR: A novel model of routing security that incorporates the ordinarily overlooked variations in trust that users have for different parts of the network is introduced, and it is found that the trust-based routing strategy can protect anonymity against an adversary capable of attacking a significant fraction of thenetwork.
Journal ArticleDOI

A Survey on Routing in Anonymous Communication Protocols

TL;DR: In this article, the authors survey previous research on designing, developing, and deploying systems for anonymous communication and provide important insights about the differences between the existing classes of anonymous communication protocols.
References
More filters
Journal ArticleDOI

A mathematical theory of communication

TL;DR: This final installment of the paper considers the case where the signals or the messages or both are continuously variable, in contrast with the discrete nature assumed until now.
Book ChapterDOI

The Sybil Attack

TL;DR: It is shown that, without a logically centralized authority, Sybil attacks are always possible except under extreme and unrealistic assumptions of resource parity and coordination among entities.
Journal ArticleDOI

Untraceable electronic mail, return addresses, and digital pseudonyms

TL;DR: A technique based on public key cryptography is presented that allows an electronic mail system to hide who a participant communicates with as well as the content of the communication - in spite of an unsecured underlying telecommunication system.
ReportDOI

Tor: the second-generation onion router

TL;DR: This second-generation Onion Routing system addresses limitations in the original design by adding perfect forward secrecy, congestion control, directory servers, integrity checking, configurable exit policies, and a practical design for location-hidden services via rendezvous points.
Book ChapterDOI

Blind Signatures for Untraceable Payments

TL;DR: Automation of the way the authors pay for goods and services is already underway, as can be seen by the variety and growth of electronic banking services available to consumers.