Skip to main navigation Skip to search Skip to main content

Anonymity protocols as noisy channels

Research output: Contribution to journalArticlepeer-review

Abstract

We consider a framework in which anonymity protocols are interpreted as noisy channels in the information-theoretic sense, and we explore the idea of using the notion of capacity as a measure of the loss of anonymity. Such idea was already suggested by Moskowitz, Newman and Syverson, in their analysis of the covert channel that can be created as a result of non-perfect anonymity. We consider the case in which some leak of information is intended by design, and we introduce the notion of conditional capacity to rule out this factor, thus retrieving a natural correspondence with the notion of anonymity. Furthermore, we show how to compute the capacity and the conditional capacity when the anonymity protocol satisfies certain symmetries. We also investigate how the adversary can test the system to try to infer the user's identity, and we study how his probability of success depends on the characteristics of the channel. We then illustrate how various notions of anonymity can be expressed in this framework, and show the relation with some definitions of probabilistic anonymity in literature. Finally, we show how to compute the matrix of the channel (and hence the capacity and conditional capacity) using model checking.

Original languageEnglish
Pages (from-to)378-401
Number of pages24
JournalInformation and Computation
Volume206
Issue number2-4
DOIs
Publication statusPublished - 1 Jan 2008

Fingerprint

Dive into the research topics of 'Anonymity protocols as noisy channels'. Together they form a unique fingerprint.

Cite this