Anonymity protocols as noisy channels

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

We propose a framework in which anonymity protocols are interpreted as particular kinds of channels, and the degree of anonymity provided by the protocol as the converse of the channel's capacity. We also investigate how the adversary can test the system to try to infer the user's identity, and we study how his probability of success depends on the characteristics of the channel. We then illustrate how various notions of anonymity can be expressed in this framework, and show the relation with some definitions of probabilistic anonymity in literature.

Original languageEnglish
Title of host publicationTrustworthy Global Computing - Second Symposium, TGC 2006, Revised Selected Papers
PublisherSpringer Verlag
Pages281-300
Number of pages20
ISBN (Print)9783540753339
DOIs
Publication statusPublished - 1 Jan 2007
Event2nd International Symposium on Trustworthy Global Computing, TGC 2006 - Lucca, Italy
Duration: 7 Nov 20069 Nov 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4661 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference2nd International Symposium on Trustworthy Global Computing, TGC 2006
Country/TerritoryItaly
CityLucca
Period7/11/069/11/06

Fingerprint

Dive into the research topics of 'Anonymity protocols as noisy channels'. Together they form a unique fingerprint.

Cite this