Entropy Bounds for Traffic Confirmation

نویسنده

  • Luke O'Connor
چکیده

Consider an open MIX-based anonymity system with N participants and a batch size of b. Assume a global passive adversary who targets a given participant Alice with a set RA of m communicating partners. Let H(RA | Bt) denote the entropy of RA as calculated by the adversary given t message sets (MIX batches) where Alice is a sender in each message set. Our main result is to express the rate at which the anonymity of Alice (as measured by RA) degrades over time as a function of the main parameters N , b and m. Assuming m, b < √ N , we prove that there is a threshold t∗ = O(m ln N) such that when t = t∗ + 5cm, for any integer c > 0, then Pr(H(RA | Bt) = 0) > 1− e−c (1) where the probabilities are computed over the random communication model. Thus once the attacker has collected a threshold t∗ of messages sets, each additional 5m message sets collected decreases H(RA | Bt) towards zero geometrically. We provide formulas for computing the implied constant in t∗ = O(m ln N) and also to improve the constant 5 in t = t∗ + 5cm. When N > O(b m lnm), or in general for large N , the threshold can be improved to t∗ = O(m(ln b + lnm)), which is independent of N . Further, if b = O(m) then the threshold simplifies to t∗ = O(m ln m) and this bound is asymptotically optimal since the coupon collector problem indicates that t∗ = Ω(m ln m). ∗The author can be contacted via email at [email protected].

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Some properties of the parametric relative operator entropy

The notion of entropy was introduced by Clausius in 1850, and some of the main steps towards the consolidation of the concept were taken by Boltzmann and Gibbs. Since then several extensions and reformulations have been developed in various disciplines with motivations and applications in different subjects, such as statistical mechanics, information theory, and dynamical systems. Fujii and Kam...

متن کامل

On the consistency of Multithreshold Entropy Linear Classifier

Multithreshold Entropy Linear Classifier (MELC) is a recent classifier idea which employs information theoretic concept in order to create a multithreshold maximum margin model. In this paper we analyze its consistency over multithreshold linear models and show that its objective function upper bounds the amount of misclassified points in a similar manner like hinge loss does in support vector ...

متن کامل

A note on inequalities for Tsallis relative operator entropy

‎In this short note‎, ‎we present some inequalities for relative operator entropy which are generalizations of some results obtained by Zou [Operator inequalities associated with Tsallis relative operator entropy‎, ‎{em Math‎. ‎Inequal‎. ‎Appl.}‎ ‎{18} (2015)‎, ‎no‎. ‎2‎, ‎401--406]‎. ‎Meanwhile‎, ‎we also show some new lower and upper bounds for relative operator entropy and Tsallis relative o...

متن کامل

Some Results on Weighted Cumulative Entropy

Considering Rao et al. (2004) and Di Crescenzo and Longobardi (2009) studies,&nbsp;Misagh et al. (2011) proposed a weighted information which is based on the cumulative&nbsp;entropy called Weighted Cumulative Entropy (WCE). The above-mentioned model is a Shiftdependent Uncertainty Measure. In this paper, we examine some of the properties of WCE and&nbsp;obtain some bounds for that. In order to ...

متن کامل

Traffic Confirmation Attacks Despite Noise

We propose a traffic confirmation attack on lowlatency anonymous communication protocols based on computing robust real-time binary hashes of network traffic flows. Firstly, we adapt the Coskun-Memon Algorithm to construct hashes that can withstand network impairments to allow fast matching of network flows. The resulting attack has a low startup cost and achieves a true positive match rate of ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2008  شماره 

صفحات  -

تاریخ انتشار 2008