On anonymity in an electronic society

作者: Matthew Edman , Bülent Yener

DOI: 10.1145/1592451.1592456

关键词:

摘要: The past two decades have seen a growing interest in methods for anonymous communication on the Internet, both from academic community and general public. Several system designs been proposed literature, of which number implemented are used by diverse groups, such as journalists, human rights workers, military, ordinary citizens, to protect their identities Internet.In this work, we survey previous research done design, develop, deploy systems enabling private Internet. We identify describe major concepts technologies field, including mixes mix networks, onion routing, Dining Cryptographers networks. will also review powerful traffic analysis attacks that motivated improvements variations many these anonymity protocols made since introduction. Finally, summarize some open problems discuss possible directions future work field.

参考文章(97)
George Danezis, Len Sassaman, Red-Green-Black Mixes, Heartbeat Traffic to Counter (n-1) Attacks ,(2004)
Nick Mathewson, Roger Dingledine, Paul Syverson, Challenges in deploying low-latency anonymity ,(2005)
Robin Snader, Nikita Borisov, A Tune-up for Tor: Improving Security and Performance in the Tor Network. network and distributed system security symposium. ,(2008)
Josyula R. Rao, Pankaj Rohatgi, Can pseudonymity really guarantee privacy usenix security symposium. pp. 7- 7 ,(2000)
George Danezis, Andrei Serjantov, Statistical disclosure or intersection attacks on anonymity systems information hiding. pp. 293- 308 ,(2004) , 10.1007/978-3-540-30114-1_21
George Danezis, Mix-Networks with Restricted Routes privacy enhancing technologies. pp. 1- 17 ,(2003) , 10.1007/978-3-540-40956-4_1
George Danezis, Statistical Disclosure Attacks information security conference. pp. 421- 426 ,(2003) , 10.1007/978-0-387-35691-4_40
Ari Juels, Ronald L. Rivest, Markus Jakobsson, Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking usenix security symposium. pp. 339- 353 ,(2002)
M. Bellare, Optimal Asymmetric Encryption-How to Encrypt with RSA theory and application of cryptographic techniques. ,(1995)