Scavenging for Anonymity with BlogDrop

نویسندگان

  • Henry Corrigan-Gibbs
  • Bryan Ford
چکیده

Anonymous communication schemes that provide strong traffic analysis resistance (e.g., DCnets and Mix-nets) are too slow for large-scale interactive use. Low-latency systems (e.g., Tor) provide users with alarmingly small anonymity set sizes, especially in heavily monitored networks. We present preliminary work on a new anonymity protocol that makes this anonymity/latency trade-off an explicit and user-adjustable parameter. We call our technique anonymity scavenging: the longer a user is willing to wait for a message to leave the system, the more anonymity that user will be able to scavenge from other users. Our protocol builds upon previous provable schemes, and we expect formal proofs of security to be a large component of future work.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improved Univariate Microaggregation for Integer Values

Privacy issues during data publishing is an increasing concern of involved entities. The problem is addressed in the field of statistical disclosure control with the aim of producing protected datasets that are also useful for interested end users such as government agencies and research communities. The problem of producing useful protected datasets is addressed in multiple computational priva...

متن کامل

Some observations on a lightweight authentication scheme with capabilities of anonymity and trust in Internet of Things (IoT)

Over the last years‎, ‎the concept of Internet of Things (IoT) leads to a revolution in the communications of humans and things. ‎Security and efficiency could be the main challenges of that communication‎‎. ‎‎On the other hand, ‎ authenticity and confidentiality are two important goals to provide desired security in an information system‎, including IoT-based applications. An Authentication an...

متن کامل

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

Structure-radical scavenging activity relationships of hydroxytoluene derivatives

Research works proposed that radical scavenging activity of flavonoids is due to ring B, andthe remaining part of the molecule can be disregarded. Thus the objective of this work is toobserve whether hydroxytoluenes account the radical scavenging activity of flavonoid and toestablish structural requirements for their activity (as they showed appreciable activity) andelucidate a comprehensive me...

متن کامل

Improving Tor security against timing and traffic analysis attacks with fair randomization

The Tor network is probably one of the most popular online anonymity systems in the world. It has been built based on the volunteer relays from all around the world. It has a strong scientific basis which is structured very well to work in low latency mode that makes it suitable for tasks such as web browsing. Despite the advantages, the low latency also makes Tor insecure against timing and tr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012