Return to search

Fundamental Constraints And Provably Secure Constructions Of Anonymous Communication Protocols

<div>Anonymous communication networks (ACNs) are critical to communication privacy over the internet as they enable</div><div>individuals to maintain their privacy from untrusted intermediaries and endpoints.</div><div>Typically, ACNs involve messages traveling through some intermediaries before arriving at their destinations, and therefore they introduce network latency and bandwidth overheads. </div><div><br></div><div>The goal of this work is to investigate the fundamental constraints of anonymous communication (AC) protocols.</div><div>We analyze the relationship between bandwidth overhead, latency overhead, and sender anonymity or recipient anonymity against a global passive (network-level) adversary. </div><div>We confirm the widely believed trilemma </div><div>that an AC protocol can only achieve two out of the following three properties: </div><div>strong anonymity (i.e., anonymity up to a negligible chance),</div><div>low bandwidth overhead, and low latency overhead. </div><div><br></div><div>We further study anonymity against a stronger global passive adversary that can additionally passively compromise some of the AC protocol nodes.</div><div>For a given number of compromised nodes, </div><div>we derive as a necessary constraint a relationship between bandwidth and latency overhead whose violation make it impossible for an AC protocol to achieve strong anonymity. </div><div>We analyze prominent AC protocols from the literature and depict to which extent those satisfy our necessary constraints. </div><div>Our fundamental necessary constraints offer a guideline not only for improving existing AC systems but also for designing novel AC protocols with non-traditional bandwidth and latency overhead choices.</div><div><br></div><div>Using the guidelines indicated by our fundamental necessary constraints we provide two efficient protocol constructions.</div><div>First, we design a mixnet-based AC protocol Streams that provides provable mixing guarantees with the expense of latency overhead. Streams realizes a trusted third party stop-and-go mix as long as each message stays in the system for $\omega(\log \eta)$ rounds.</div><div>Second, we offer a DC-net based design OrgAn that can provide strong sender anonymity with constant latency at the expense of bandwidth overhead. OrgAn solves the problem of regular requirements of key and slot agreement present in typical DC-net based protocols, by utilizing a client/relay/server architecture.</div>

  1. 10.25394/pgs.15060825.v1
Identiferoai:union.ndltd.org:purdue.edu/oai:figshare.com:article/15060825
Date27 July 2021
CreatorsDebajyoti Das (11190285)
Source SetsPurdue University
Detected LanguageEnglish
TypeText, Thesis
RightsCC BY 4.0
Relationhttps://figshare.com/articles/thesis/Fundamental_Constraints_And_Provably_Secure_Constructions_Of_Anonymous_Communication_Protocols/15060825

Page generated in 0.0019 seconds