Anonymity protocols as noisy channels

被引:84
|
作者
Chatzikokolaks, Konstantincis [1 ,2 ]
Palamidessi, Catuscia [1 ,2 ]
Panangaden, Prakash [3 ]
机构
[1] Ecole Polytech, INRIA, Palaiseau, France
[2] Ecole Polytech, LIX, Palaiseau, France
[3] McGill Univ, Sch Comp Sci, Montreal, PQ, Canada
关键词
D O I
10.1016/j.ic.2007.07.003
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We consider a framework in which anonymity protocols are interpreted as noisy channels in the information-theoretic sense, and we explore the idea of using the notion of capacity as a measure of the loss of anonymity. Such idea was already suggested by Moskowitz, Newman and Syverson, in their analysis of the covert channel that can be created as a result of non-perfect anonymity. We consider the case in which some leak of information is intended by design, and we introduce the notion of conditional capacity to rule out this factor, thus retrieving a natural correspondence with the notion of anonymity. Furthermore, we show how to compute the capacity and the conditional capacity when the anonymity protocol satisfies certain symmetries. We also investigate how the adversary can test the system to try to infer the user's identity, and we study how his probability of success depends on the characteristics of the channel. We then illustrate how various notions of anonymity can be expressed in this framework, and show the relation with some definitions of probabilistic anonymity in literature. Finally, we show how to compute the matrix of the channel (and hence the capacity and conditional capacity) using model checking. (C) 2007 Elsevier Inc. All rights reserved.
引用
收藏
页码:378 / 401
页数:24
相关论文
共 50 条
  • [1] Anonymity Protocols as noisy channels
    Chatzikokolakis, Konstantinos
    Palamidessi, Catuscia
    Panangaden, Prakash
    TRUSTWORTHY GLOBAL COMPUTING, 2007, 4661 : 281 - +
  • [2] Analyzing anonymity attacks through noisy channels
    Zhioua, Sami
    INFORMATION AND COMPUTATION, 2015, 244 : 76 - 112
  • [3] Multiuser Authentication with Anonymity Constraints over Noisy Channels
    Chou, Remi A.
    Yener, Aylin
    2016 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2016, : 2439 - 2443
  • [4] Generalized oblivious transfer protocols based on noisy channels
    Korjik, V
    Morozov, K
    INFORMATION ASSURANCE IN COMPUTER NETWORKS: METHODS, MODELS AND ARCHITECTURES FOR NETWORK SECURITY, PROCEEDINGS, 2001, 2052 : 219 - 229
  • [5] ANALYSIS OF PROTOCOLS OF SHARED ACCESS TO NOISY RADIO CHANNELS.
    Markhasin, A.B.
    Automatic Control and Computer Sciences, 1983, 17 (02) : 30 - 39
  • [6] New Secure Quantum Dialogue Protocols over Collective Noisy Channels
    Yu-Guang Yang
    Shang Gao
    Yi-Hua Zhou
    Wei-Min Shi
    International Journal of Theoretical Physics, 2019, 58 : 2810 - 2822
  • [7] New Secure Quantum Dialogue Protocols over Collective Noisy Channels
    Yang, Yu-Guang
    Gao, Shang
    Zhou, Yi-Hua
    Shi, Wei-Min
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2019, 58 (09) : 2810 - 2822
  • [8] Group Anonymity in Security Protocols
    Tiplea, Ferucio Laurentiu
    Varlan, Cosmin
    PROCEEDINGS OF THE 2018 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), 2018, : 407 - 416
  • [9] Performance modelling of anonymity protocols
    Carlsson, Niklas
    Williamson, Carey
    Hirt, Andreas
    Jacobson, Michael, Jr.
    PERFORMANCE EVALUATION, 2012, 69 (12) : 643 - 661
  • [10] Complexity of Anonymity for Security Protocols
    Tiplea, Ferucio Laurentiu
    Vamanu, Loredana
    Varlan, Cosmin
    COMPUTER SECURITY-ESORICS 2010, 2010, 6345 : 558 - 572