The hitting set attack on anonymity protocols

被引:0
|
作者
Kesdogan, D [1 ]
Pimenidis, L [1 ]
机构
[1] Rhein Westfal TH Aachen, Comp Sci Dept Informat 4, D-52074 Aachen, Germany
来源
INFORMATION HIDING | 2004年 / 3200卷
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A passive attacker can compromise a generic anonymity protocol by applying the so called disclosure attack, i.e. a special traffic analysis attack. In this work we present a more efficient way to accomplish this goal, i.e. we need less observations by looking for unique minimal hitting sets. We call this the hitting set attack or just HS-attack. In general, solving the minimal hitting set problem is NP-hard. Therefore, we use frequency analysis to enhance the applicability of our attack. It is possible to apply highly efficient backtracking search algorithms. We call this approach the statistical hitting set attack or SHS-attack. However, the statistical hitting set attack is prone to wrong solutions with a given small probability. We use here duality checking algorithms to resolve this problem. We call this final exact attack the HS*-attack.
引用
收藏
页码:326 / 339
页数:14
相关论文
共 50 条
  • [1] A new statistical hitting set attack on anonymity protocols
    Liu, Jing
    Xu, Hong-Yun
    Xie, Cheng
    CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 922 - 925
  • [2] Breaking Anonymity by Learning a Unique Minimum Hitting Set
    Kesdogan, Dogan
    Moelle, Daniel
    Richter, Stefan
    Rossmanith, Peter
    COMPUTER SCIENCE - THEORY AND APPLICATIONS, 2009, 5675 : 299 - +
  • [3] Towards Relations Between the Hitting-Set Attack and the Statistical Disclosure Attack
    Dang Vinh Pham
    Kesdogan, Dogan
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, 2015, 455 : 35 - 50
  • [4] Group Anonymity in Security Protocols
    Tiplea, Ferucio Laurentiu
    Varlan, Cosmin
    PROCEEDINGS OF THE 2018 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), 2018, : 407 - 416
  • [5] (k, ε)-Anonymity: an Anonymity Model for Thwarting Similarity Attack
    Wang, Haiyuan
    Han, Jianmin
    Wang, Jiyi
    Wang, Lixia
    2013 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING (GRC), 2013, : 332 - 337
  • [6] Anonymity Protocols as noisy channels
    Chatzikokolakis, Konstantinos
    Palamidessi, Catuscia
    Panangaden, Prakash
    TRUSTWORTHY GLOBAL COMPUTING, 2007, 4661 : 281 - +
  • [7] Anonymity protocols as noisy channels
    Chatzikokolaks, Konstantincis
    Palamidessi, Catuscia
    Panangaden, Prakash
    INFORMATION AND COMPUTATION, 2008, 206 (2-4) : 378 - 401
  • [8] Performance modelling of anonymity protocols
    Carlsson, Niklas
    Williamson, Carey
    Hirt, Andreas
    Jacobson, Michael, Jr.
    PERFORMANCE EVALUATION, 2012, 69 (12) : 643 - 661
  • [9] Complexity of Anonymity for Security Protocols
    Tiplea, Ferucio Laurentiu
    Vamanu, Loredana
    Varlan, Cosmin
    COMPUTER SECURITY-ESORICS 2010, 2010, 6345 : 558 - 572
  • [10] Dynamic Geometric Set Cover and Hitting Set
    Agarwal, Pankaj
    Chang, Hsien-Chih
    Suri, Subhash
    Xiao, Allen
    Xue, Jie
    ACM TRANSACTIONS ON ALGORITHMS, 2022, 18 (04)