The Dangers of Composing Anonymous Channels

نویسندگان

  • George Danezis
  • Emilia Käsper
چکیده

We present traffic analyses of two anonymous communications schemes that build on the classic Crowds/Hordes protocols. The AJSS10 [1] scheme combines multiple Crowds-like forward channels with a Hordes reply channel in an attempt to offer robustness in a mobile environment. We show that the resulting scheme fails to guarantee the claimed k-anonymity, and is in fact more vulnerable to malicious peers than Hordes, while suffering from higher latency. Similarly, the RWS11 [15] scheme invokes multiple instances of Crowds to provide receiver anonymity. We demonstrate that the sender anonymity of the scheme is susceptible to a variant of the predecessor attack [21], while receiver anonymity is fully compromised with an active attack. We conclude that the heuristic security claims of AJSS10 and RWS11 do not hold, and argue that composition of multiple anonymity channels can in fact weaken overall security. In contrast, we provide a rigorous security analysis of Hordes under the same threat model, and reflect on design principles for future anonymous channels to make them amenable to such security analysis.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Voltage-Gated Sodium Channels Modulation by Bothutous Schach Scorpion Venom

Buthotus schach is one of the dangers scorpion in Iran that belong to the Buthidae family. Toxins are existing in venom scorpion, modulate the ion channels by blocking or opening the pore of the channel or by altering the voltage gating and useful as pharmacological tools. In the present study, we investigated the effect of venom and its obtained fractions by gel filtrations on electrophysiolog...

متن کامل

مقایسه نیمرخ شخصیتی معتادان گمنام و غیر گمنام زندانی مرد

Aim: This study compared the personality profiles of inmate anonymous and non-anonymous male addicts. Method: The participants of study were anonymous and non-anonymous male addicts of the prisons of the Hamadan province in 1391. The population was 3130 addicts, including 627 anonymous and 2503 non-anonymous addicts. The 310 addicts were selected by stratified random sampling the sample size wa...

متن کامل

The Ethical Dangers of Deliberative Decision Making

This project benefited from the financial assistance of the Dispute Resolution Research Center at the Kellogg Graduate School of Management at Northwestern University. I want to thank Stéphane Côté, Sanford DeVoe, Adam Galinsky, Julian House, Keith Murnighan, Brendan Strejcek, and three anonymous reviewers for their constructive and insightful comments on early versions of this manuscript. The ...

متن کامل

Anonymous Gossiping

In this paper we introduce a novel gossiping primitive to support privacy preserving data analytics (PPDA). In contrast to existing computational PPDA primitives such as secure multiparty computation and data randomization based approaches, the proposed primitive “anonymous gossiping” is a communication primitive for privacy preserving personalized information aggregation complementing such tra...

متن کامل

Comparing the effects of combined cognitive behavioral therapy and methadone therapy with the association of narcotics anonymous addicts on executive functions of quitting drugs volunteer addicts in Jiroft

Introduction: Currently, a combination of drug and psychological therapies is common to treat and prevent relapse in addicts. One of the most important strategies for recovery and prevention of relapse is psychological therapy and maintenance therapy applying drugs such as methadone. Therefore, the present study compares the effect of cognitive-behavioral and methadone therapy combination thera...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012