تفاصيل الكتاب

978-3-540-31960-3

Privacy Enhancing Technologies (vol. # 3424)

Publication Date: 2005

ISBN: 978-3-540-31960-3

Internet Resource: Please Login to download book


Traditional methods for evaluating the amount of anonymity afforded by various Mix configurations have depended on either measuring the size of the set of possible senders of a particular message (the anonymity set size), or by measuring the entropy associated with the probability distribution of the messages possible senders. This paper explores further an alternative way of assessing the anonymity of a Mix system by considering the capacity of a covert channel from a sender behind the Mix to an observer of the Mix’s output. Initial work considered a simple model [4], with an observer (Eve) restricted to counting the number of messages leaving a Mix configured as a firewall guarding an enclave with one malicious sender (Alice) and some other naive senders (Cluelessi’s). Here, we consider the case where Eve can distinguish between multiple destinations, and the senders can select to which destination their message (if any) is sent each clock tick.


Subject: Computer Science, IPv6, Internet services, LA, Ubiquitous Computing, Web security, anonymity, anonymization, communication, distributed information systems, intrusion detection, network security, privacy, privacy protection, private information retrieval, trust