Open AccessProceedings Article
Systems for Anonymous Communication
George Danezis,Claudia Diaz,Paul Syverson +2 more
- pp 341-390
TLDR
An overview of the eld of anonymous communications, from its establishment in 1981 by David Chaum to today, and key systems are presented categorized according to their underlying principles: semitrusted relays, mix systems, remailers, robust & veriable mixes, and onion routing systems.Abstract:
We present an overview of the eld of anonymous communications, from its establishment in 1981 by David Chaum to today. Key systems are presented categorized according to their underlying principles: semitrusted relays, mix systems, remailers, robust & veriable mixes, and onion routing systems. We include extended discussions of the threat models and usage models that dierent schemes provide, and the tradeos between the security properties oered and the communication characteristics dierent systems support.read more
Citations
More filters
Journal ArticleDOI
A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements
TL;DR: This paper presents a comprehensive framework to model privacy threats in software-based systems and provides an extensive catalog of privacy-specific threat tree patterns that can be used to detail the threat analysis outlined above.
Proceedings ArticleDOI
Unobservable communication over fully untrusted infrastructure
Sebastian Angel,Srinath Setty +1 more
TL;DR: Pung is a key-value store where clients deposit and retrieve messages without anyone-- including Pung's servers--learning of the existence of a conversation, based on private information retrieval, which makes more practical for the setting with new techniques.
Journal ArticleDOI
Information privacy
TL;DR: It is argued that applications on the Internet should be built with privacy and security as a mandatory requirement, then an overview of the state of the art in privacy-enhancing mechanisms is provided, and a roadmap towards a privacy- enhanced digital world is concluded, pointing out a number of challenges that need to be solved.
Proceedings ArticleDOI
Trust-based anonymous communication: adversary models and routing algorithms
TL;DR: A novel model of routing security that incorporates the ordinarily overlooked variations in trust that users have for different parts of the network is introduced, and it is found that the trust-based routing strategy can protect anonymity against an adversary capable of attacking a significant fraction of thenetwork.
Journal ArticleDOI
A Survey on Routing in Anonymous Communication Protocols
TL;DR: In this article, the authors survey previous research on designing, developing, and deploying systems for anonymous communication and provide important insights about the differences between the existing classes of anonymous communication protocols.
References
More filters
Journal ArticleDOI
A mathematical theory of communication
TL;DR: This final installment of the paper considers the case where the signals or the messages or both are continuously variable, in contrast with the discrete nature assumed until now.
Book ChapterDOI
The Sybil Attack
TL;DR: It is shown that, without a logically centralized authority, Sybil attacks are always possible except under extreme and unrealistic assumptions of resource parity and coordination among entities.
Journal ArticleDOI
Untraceable electronic mail, return addresses, and digital pseudonyms
TL;DR: A technique based on public key cryptography is presented that allows an electronic mail system to hide who a participant communicates with as well as the content of the communication - in spite of an unsecured underlying telecommunication system.
ReportDOI
Tor: the second-generation onion router
TL;DR: This second-generation Onion Routing system addresses limitations in the original design by adding perfect forward secrecy, congestion control, directory servers, integrity checking, configurable exit policies, and a practical design for location-hidden services via rendezvous points.
Book ChapterDOI
Blind Signatures for Untraceable Payments
TL;DR: Automation of the way the authors pay for goods and services is already underway, as can be seen by the variety and growth of electronic banking services available to consumers.