Back to Search Start Over

Anonymity protocols as noisy channels

Authors :
Chatzikokolakis, K.
Palamidessi, C.
Panangaden, P.
Montanari, U.
Sannella, D.
Bruni, R.
Concurrency, Mobility and Transactions (COMETE)
Laboratoire d'informatique de l'École polytechnique [Palaiseau] (LIX)
École polytechnique (X)-Centre National de la Recherche Scientifique (CNRS)-École polytechnique (X)-Centre National de la Recherche Scientifique (CNRS)-Inria Saclay - Ile de France
Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)
Ugo Montanari and Don Sannella
Source :
Trustworthy Global Computing ISBN: 9783540753339, TGC, Trustworthy global computing : second symposium, TGC 2006, Lucca, Italy, November 7-9, 2006 : revised selected papers), 281-300, STARTPAGE=281;ENDPAGE=300;TITLE=Trustworthy global computing : second symposium, TGC 2006, Lucca, Italy, November 7-9, 2006 : revised selected papers), 2nd Symposium on Trustworthy Global Computing (TGC), 2nd Symposium on Trustworthy Global Computing (TGC), Nov 2006, Lucca, Italy. pp.281-300, ⟨10.1007/978-3-540-75336-0_18⟩, Information and Computation, 206(2-4), 378-401. Elsevier, Information and Computation, Information and Computation, 2008, 206 (2-4), pp.378--401. ⟨10.1016/j.ic.2007.07.003⟩
Publication Year :
2008
Publisher :
Elsevier BV, 2008.

Abstract

International audience; We consider a framework in which anonymity protocols are interpreted as noisy channels in the information-theoretic sense, and we explore the idea of using the notion of capacity as a measure of the loss of anonymity. Such idea was already suggested by Moskowitz, Newman and Syverson, in their analysis of the covert channel that can be created as a result of non-perfect anonymity. We consider the case in which some leak of information is intended by design, and we introduce the notion of conditional capacity to rule out this factor, thus retrieving a natural correspondence with the notion of anonymity. Furthermore, we show how to compute the capacity and the conditional capacity when the anonymity protocol satisfies certain symmetries. We also investigate how the adversary can test the system to try to infer the user's identity, and we study how his probability of success depends on the characteristics of the channel. We then illustrate how various notions of anonymity can be expressed in this framework, and show the relation with some definitions of probabilistic anonymity in literature. Finally, we show how to compute the matrix of the channel (and hence the capacity and conditional capacity) using model checking.

Details

ISBN :
978-3-540-75333-9
ISSN :
08905401 and 10902651
ISBNs :
9783540753339
Volume :
206
Issue :
2-4
Database :
OpenAIRE
Journal :
Information and Computation
Accession number :
edsair.doi.dedup.....e67f6877bdbb3a53d64250dfc829ef54
Full Text :
https://doi.org/10.1016/j.ic.2007.07.003