Passer à la navigation principale Passer à la recherche Passer au contenu principal

Anonymity attacks on mix systems: A formal analysis

  • Sami Zhioua

Résultats de recherche: Le chapitre dans un livre, un rapport, une anthologie ou une collectionContribution à une conférenceRevue par des pairs

Résumé

Information theory turned out to be very useful in analyzing anonymity attacks in general. The concept of channel information leak is a good indicator of how successful an attack can be. While different information leak measures exist in the literature, the problem of representing anonymity systems using noisy channels has not been well studied. The main goal of this paper is to show how anonymity attacks on mix systems can be formally represented as noisy channels in the information-theoretic sense. This formal representation provides a deeper understanding of mix systems and prepares the field for a more rigorous and accurate analysis of possible attacks. We performed empirical analysis using three information leak measures (mutual information, KLSD, and Min-entropy) which revealed interesting findings about some mix variants. This paper tries to bridge the gap between theory and practice in the field of anonymous communication systems.

langue originaleAnglais
titreInformation Hiding - 13th International Conference, IH 2011, Revised Selected Papers
Pages133-147
Nombre de pages15
Les DOIs
étatPublié - 26 sept. 2011
Modification externeOui
Evénement13th International Conference on Information Hiding, IH 2011 - Prague, République tchcque
Durée: 18 mai 201120 mai 2011

Série de publications

NomLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6958 LNCS
ISSN (imprimé)0302-9743
ISSN (Electronique)1611-3349

Une conférence

Une conférence13th International Conference on Information Hiding, IH 2011
Pays/TerritoireRépublique tchcque
La villePrague
période18/05/1120/05/11

Empreinte digitale

Examiner les sujets de recherche de « Anonymity attacks on mix systems: A formal analysis ». Ensemble, ils forment une empreinte digitale unique.

Contient cette citation