Back to Search
Start Over
Anonymity protocols as noisy channels
- Source :
- Trustworthy Global Computing ISBN: 9783540753339, TGC, Trustworthy global computing : second symposium, TGC 2006, Lucca, Italy, November 7-9, 2006 : revised selected papers), 281-300, STARTPAGE=281;ENDPAGE=300;TITLE=Trustworthy global computing : second symposium, TGC 2006, Lucca, Italy, November 7-9, 2006 : revised selected papers), 2nd Symposium on Trustworthy Global Computing (TGC), 2nd Symposium on Trustworthy Global Computing (TGC), Nov 2006, Lucca, Italy. pp.281-300, ⟨10.1007/978-3-540-75336-0_18⟩, Information and Computation, 206(2-4), 378-401. Elsevier, Information and Computation, Information and Computation, 2008, 206 (2-4), pp.378--401. ⟨10.1016/j.ic.2007.07.003⟩
- Publication Year :
- 2008
- Publisher :
- Elsevier BV, 2008.
-
Abstract
- International audience; We consider a framework in which anonymity protocols are interpreted as noisy channels in the information-theoretic sense, and we explore the idea of using the notion of capacity as a measure of the loss of anonymity. Such idea was already suggested by Moskowitz, Newman and Syverson, in their analysis of the covert channel that can be created as a result of non-perfect anonymity. We consider the case in which some leak of information is intended by design, and we introduce the notion of conditional capacity to rule out this factor, thus retrieving a natural correspondence with the notion of anonymity. Furthermore, we show how to compute the capacity and the conditional capacity when the anonymity protocol satisfies certain symmetries. We also investigate how the adversary can test the system to try to infer the user's identity, and we study how his probability of success depends on the characteristics of the channel. We then illustrate how various notions of anonymity can be expressed in this framework, and show the relation with some definitions of probabilistic anonymity in literature. Finally, we show how to compute the matrix of the channel (and hence the capacity and conditional capacity) using model checking.
- Subjects :
- Dining cryptographers problem
Theoretical computer science
Relation (database)
Computer science
Covert channel
Information theory
Computer security
computer.software_genre
Theoretical Computer Science
Channel capacity
Converse
Mathematics
Protocol (science)
business.industry
Probabilistic logic
[INFO.INFO-LO]Computer Science [cs]/Logic in Computer Science [cs.LO]
Mutual information
Adversary
Computer Science Applications
Computational Theory and Mathematics
Identity (object-oriented programming)
Artificial intelligence
business
computer
Communication channel
Anonymity
Information Systems
Subjects
Details
- ISBN :
- 978-3-540-75333-9
- ISSN :
- 08905401 and 10902651
- ISBNs :
- 9783540753339
- Volume :
- 206
- Issue :
- 2-4
- Database :
- OpenAIRE
- Journal :
- Information and Computation
- Accession number :
- edsair.doi.dedup.....e67f6877bdbb3a53d64250dfc829ef54
- Full Text :
- https://doi.org/10.1016/j.ic.2007.07.003