摘要: Providing anonymity support for peer-to-peer (P2P) overlay networks is critical. Otherwise, potential privacy attacks (e.g., network address traceback) may deter a storage source from providing the needed data. In this paper we use practical application scenario to verify our observation that network-based can be modeled as complexity based cryptographic problem. We show that, if routing process between senders and recipients abstract entities, becomes an analogy of cryptography. particular, perfect facing unbounded traffic analyst corresponds Shannon’s secrecy cryptanalyst. More importantly, in propose Probabilistic Polynomial Route (PPR) model, which new polynomially-bounded model corresponding Time (PPT ) Afterwards, are with no exception BPP. This phenomenon has not been discovered previous research. Keywords—Formal notion anonymity; model; Chosen Recipient Attack; Sender P2P network.