P5: A Protocol for Scalable Anonymous Communication
نویسندگان
چکیده
We present a protocol for anonymous communication over the Internet. Our protocol, called P5 (Peerto-Peer Personal Privacy Protocol) provides sender-, receiver-, and sender-receiver anonymity. P5 is designed to be implemented over the current Internet protocols, and does not require any special infrastructure support. A novel feature of P5 is that it allows individual participants to trade-off degree of anonymity for communication efficiency, and hence can be used to scalably implement large anonymous groups. We present a description of P5, an analysis of its anonymity and communication efficiency, and evaluate its performance using detailed packet-level simulations.
منابع مشابه
P: A Protocol for Scalable Anonymous Communication
We present a protocol for anonymous communication over the Internet. Our protocol, called P 5 (Peer-to-Peer Personal Privacy Protocol) provides sender-, receiver-, and sender-receiver anonymity. P 5 is designed to be implemented over the current Internet protocols, and does not require any special infrastructure support. A novel feature of P is that it allows individual participants to trade-of...
متن کاملProgress Report on the LTS / UMIACS Contract RFP : MDA 904 - 02 - R - 0151 – SOW : R 4 - 02 - 0001 . 1 January 31 , 2004
We first present a protocol for anonymous communication over the Internet. Ourprotocol, called P5 (Peer-to-Peer Personal Privacy Protocol) provides sender-, receiver-,and sender-receiver anonymity. P5 is designed to be implemented over the currentInternet protocols, and does not require any special infrastructure support. We present anoutline of the P5 protocol, and a set of...
متن کاملHerbivore: A Scalable and Efficient Protocol for Anonymous Communication
Anonymity is increasingly important for networked applications amidst concerns over censorship and privacy. In this paper, we describe Herbivore, a peer-to-peer, scalable, tamper-resilient communication system that provides provable anonymity and privacy. Building on dining cryptographer networks, Herbivore scales by partitioning the network into anonymizing cliques. Adversaries able to monitor...
متن کاملA scalable anonymous protocol for heterogeneous wireless ad hoc networks
Ensuring anonymity in wireless and hoc networks is a major security goal. Using traffic analysis, the attacker can compromise the network functionality by correlating data flow patterns to event locations/active areas. In this paper we present a novel Scalable Anonymous Protocol that hides the location of nodes and obscure the correlation between event zones and data flow from snooping adversar...
متن کاملCliqueNet: A Self-Organizing, Scalable, Peer-to-Peer Anonymous Communication Substrate
Anonymity is critical for many networked applications. Yet current Internet protocols provide no support for masking the identity of communication endpoints. This paper outlines a design for a peer-to-peer, scalable, tamper-resilient communication protocol that provides strong anonymity and privacy. Called CliqueNet, our protocol provides an information-theoretic guarantee: an omnipotent advers...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Journal of Computer Security
دوره 13 شماره
صفحات -
تاریخ انتشار 2002