TY - GEN
T1 - On the limits of provable anonymity
AU - Gelernter, Nethanel
AU - Herzberg, Amir
PY - 2013
Y1 - 2013
N2 - We study provably secure anonymity. We begin with rigorous definition of anonymity against wide range of computationally bounded attackers, including eavesdroppers, malicious peers, malicious destinations, and their combinations. Following [hevia2008indistinguishability], our definition is generic, and captures different notions of anonymity (e.g., unobservability and sender anonymity). We then study the feasibility of ultimate anonymity: the strongest-possible anonymity requirements and adversaries. We show there is a protocol satisfying this requirement, but with absurd (although polynomial) inefficiency and overhead. We show that such inefficiency and overhead are unavoidable for 'ultimate anonymity'. We then present a slightly-relaxed requirement and present feasible protocols for it.
AB - We study provably secure anonymity. We begin with rigorous definition of anonymity against wide range of computationally bounded attackers, including eavesdroppers, malicious peers, malicious destinations, and their combinations. Following [hevia2008indistinguishability], our definition is generic, and captures different notions of anonymity (e.g., unobservability and sender anonymity). We then study the feasibility of ultimate anonymity: the strongest-possible anonymity requirements and adversaries. We show there is a protocol satisfying this requirement, but with absurd (although polynomial) inefficiency and overhead. We show that such inefficiency and overhead are unavoidable for 'ultimate anonymity'. We then present a slightly-relaxed requirement and present feasible protocols for it.
KW - anonymity
KW - anonymous communication
KW - metrics
KW - theory
KW - unlinkability
KW - unobservability
UR - http://www.scopus.com/inward/record.url?scp=84889016952&partnerID=8YFLogxK
U2 - 10.1145/2517840.2517850
DO - 10.1145/2517840.2517850
M3 - ???researchoutput.researchoutputtypes.contributiontobookanthology.conference???
AN - SCOPUS:84889016952
SN - 9781450324854
T3 - Proceedings of the ACM Conference on Computer and Communications Security
SP - 225
EP - 235
BT - WPES 2013 - Proceedings of the 2013 ACM Workshop on Privacy in the Electronic Society, Co-located with CCS 2013
T2 - 1st ACM Workshop on Language Support for Privacy-Enhancing Technologies, PETShop 2013 - Co-located with the 20th ACM Conference on Computer and Communications Security, CCS 2013
Y2 - 4 November 2013 through 4 November 2013
ER -