Abstract
In this paper we study the anonymity provided by generalized mixes that insert dummy traffic. Mixes are an essential component to offer anonymous email services. We indicate how to compute the recipient and sender anonymity and we point out some problems that may arise from the intuitive extension of the metric to take into account dummies. Two possible ways of inserting dummy traffic are discussed and compared. An active attack scenario is considered, and the anonymity provided by mixes under the attack is analyzed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Chaum, D.: Untraceable electronic mail, return addresses and digital pseudonyms. Communications of the A.C.M. 24(2), 84–88 (1981)
Cottrell, L.: Mixmaster and remailer attacks, http://www.obscura.com/~loki/remailer/remailer-essay.html
Danezis, G.: Mix-networks with restricted routes. In: Privacy Enhacing Technologies, LNCS, Dresden, Germany (April 2003)
Diaz, C., Preneel, B.: Taxonomy of mixes and dummy traffic. In: Accepted submission at I-NetSec04: 3rd Working Conference on Privacy and Anonymity in Networked and Distributed Systems, August 2004, Kluwer academic publishers, Dordrecht (2004)
Danezis, G., Sassaman, L.: Heartbeat traffic to counter (n-1) attacks. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2003), Washington, DC, USA (October 2003)
Diaz, C., Serjantov, A.: Generalising mixes. In: Privacy Enhacing Technologies, LNCS, Dresden, Germany (April 2003)
Diaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Privacy Enhancing Technologies (April 2002)
Diaz, C., Sassaman, L., Dewitte, E.: Comparison between two practical mix designs. Technical report, K.U.Leuven (2004) (submitted to ESORICS 2004)
Jerichow, A.: Generalisation and security improvement of mix-mediated anonymous communication. Ph.D. thesis, Technischen Universitat Dresden (2000)
Kesdogan, D., Egner, J., Buschkes, R.: Stop-and-go-mixes providing probabilistic anonymity in an open system. In: Proceedings of the International Information Hiding Workshop (1998)
Moeller, U., Cottrell, L.: Mixmaster Protocol Version 3 (2000), http://www.eskimo.com/~rowdenw/crypt/Mix/draft-moeller-v3-01.txt
Pfitzmann, A., Kohntopp, M.: Anonymity, unobservability and pseudonymity—a proposal for terminology. In: Designing Privacy Enhancing Technologies: Proceedings of the International Workshop on the Design Issues in Anonymity and Observability, pp. 1–9 (July 2000)
Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Privacy Enhacing Technologies, LNCS, San Francisco, CA (April 2002)
Serjantov, A., Dingledine, R., Syverson, P.: From a trickle to a flood: Active attacks on several mix types. In: Petitcolas, F. (ed.) Information Hiding Workshop (October 2002)
Serjantov, A., Newman, R.E.: On the anonymity of timed pool mixes. In: Workshop on Privacy and Anonymity in Networked and Distributed Systems (18th IFIP International Information Security Conference), Athens, Greece (May 2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Díaz, C., Preneel, B. (2004). Reasoning About the Anonymity Provided by Pool Mixes That Generate Dummy Traffic. In: Fridrich, J. (eds) Information Hiding. IH 2004. Lecture Notes in Computer Science, vol 3200. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30114-1_22
Download citation
DOI: https://doi.org/10.1007/978-3-540-30114-1_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-24207-9
Online ISBN: 978-3-540-30114-1
eBook Packages: Computer ScienceComputer Science (R0)