No right to remain silent: Isolating Malicious Mixes

نویسندگان

  • Hemi Leibowitz
  • Ania M. Piotrowska
  • George Danezis
  • Amir Herzberg
چکیده

Mix networks are a key technology to provide network anonymity, used for messaging, voting and private lookups. However, simple mix networks are insecure against malicious mixes, which can drop or delay packets to facilitate traffic analysis attacks. Mix networks with provable robustness address this by using complex and expensive proofs of correct shuffling, which come with a cost and make assumptions that are unnatural to many settings in which mix networks are deployed. We present Miranda, a synchronous mix network mechanism, which is provably secure against malicious mixes – yet retaining the simplicity, efficiency and practicality of mix network designs. Miranda uses first-hand experience of unreliability by mixes and clients, to derive a mix ‘reputation’, and to ensure that each active attack – including dropping of packets – results in reduction in the connectivity of the malicious mixes, thus reducing their ability to attack. Besides the practical importance of Miranda itself, our results are applicable to other mix networks designs and anonymous communication, and even unrelated settings in which reputation could provide effective defense against malicious participants.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Silent Tachypnoea in a Neonate: A Rare Presentation of Right Side Bochdalek Hernia with Intrathoracic Kidney

Congenital diaphragmatic hernia (CDH) is a rare condition. The reported incidence of intrathoracic renal ectopia due to CDH is also rare. A right-sided thoracic kidney is much less common due to the location of the liver. Isolated intrathoracic kidney is usually asymptomatic and diagnosed incidentally on chest imaging. The authors report on a 21days old female infant with late-presenting right ...

متن کامل

Rod Electroretinograms Elicited by Silent Substitution Stimuli from the Light-Adapted Human Eye

PURPOSE To demonstrate that silent substitution stimuli can be used to generate electroretinograms (ERGs) that effectively isolate rod photoreceptor function in humans without the need for dark adaptation, and that this approach constitutes a viable alternative to current clinical standard testing protocols. METHODS Rod-isolating and non-isolating sinusoidal flicker stimuli were generated on ...

متن کامل

حقوق دفاعی متهم در «دوران تحت نظر» در قانون آیین دادرسی کیفری و بررسی تطبیقی آن با حقوق انگلستان

Taking the accused into surveillance by police officers in witnessed crimes is one of the most important authorities of them. Certainly giving this authority to police officers, which leads to the denial of freedom of accused for movement in limited time, is based on the efforts in order to achieve principal interests as finding out the truth and reveal the fact in criminal cases as well obtain...

متن کامل

Poster Abstract Secure Locations: Routing on Trust and Isolating Compromised Sensors in Location-Aware Sensor Networks

In data-centric sensor networks, where data processing and transfer are oblivious to node IDs, conventional node-based security models are not suitable. We introduce the novel concept of secure locations to address non-cooperative and malicious behavior in location-aware sensor networks. Our architecture also introduces a scalable trust-based routing protocol (TRANS) to track, update and route ...

متن کامل

Dyspnea as the First Manifestation of Silent Renal Cell Carcinoma

Renal cell carcinoma (RCC) accounts for only 3% of adult malignancies, and the lung is the most common site of metastasis of this tumor, which may be accompanied by pleural metastasis. However, solitary pleural involvement is very rare and its presentation with dyspnea as the first manifestation of RCC is extremely rare.We describe a 39-year-old male with episodes of dyspnea dating back 6...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2017  شماره 

صفحات  -

تاریخ انتشار 2017