Skip to main content

Reasoning About the Anonymity Provided by Pool Mixes That Generate Dummy Traffic

  • Conference paper
Information Hiding (IH 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3200))

Included in the following conference series:

Abstract

In this paper we study the anonymity provided by generalized mixes that insert dummy traffic. Mixes are an essential component to offer anonymous email services. We indicate how to compute the recipient and sender anonymity and we point out some problems that may arise from the intuitive extension of the metric to take into account dummies. Two possible ways of inserting dummy traffic are discussed and compared. An active attack scenario is considered, and the anonymity provided by mixes under the attack is analyzed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chaum, D.: Untraceable electronic mail, return addresses and digital pseudonyms. Communications of the A.C.M. 24(2), 84–88 (1981)

    Google Scholar 

  2. Cottrell, L.: Mixmaster and remailer attacks, http://www.obscura.com/~loki/remailer/remailer-essay.html

  3. Danezis, G.: Mix-networks with restricted routes. In: Privacy Enhacing Technologies, LNCS, Dresden, Germany (April 2003)

    Google Scholar 

  4. Diaz, C., Preneel, B.: Taxonomy of mixes and dummy traffic. In: Accepted submission at I-NetSec04: 3rd Working Conference on Privacy and Anonymity in Networked and Distributed Systems, August 2004, Kluwer academic publishers, Dordrecht (2004)

    Google Scholar 

  5. Danezis, G., Sassaman, L.: Heartbeat traffic to counter (n-1) attacks. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2003), Washington, DC, USA (October 2003)

    Google Scholar 

  6. Diaz, C., Serjantov, A.: Generalising mixes. In: Privacy Enhacing Technologies, LNCS, Dresden, Germany (April 2003)

    Google Scholar 

  7. Diaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Privacy Enhancing Technologies (April 2002)

    Google Scholar 

  8. Diaz, C., Sassaman, L., Dewitte, E.: Comparison between two practical mix designs. Technical report, K.U.Leuven (2004) (submitted to ESORICS 2004)

    Google Scholar 

  9. Jerichow, A.: Generalisation and security improvement of mix-mediated anonymous communication. Ph.D. thesis, Technischen Universitat Dresden (2000)

    Google Scholar 

  10. Kesdogan, D., Egner, J., Buschkes, R.: Stop-and-go-mixes providing probabilistic anonymity in an open system. In: Proceedings of the International Information Hiding Workshop (1998)

    Google Scholar 

  11. Moeller, U., Cottrell, L.: Mixmaster Protocol Version 3 (2000), http://www.eskimo.com/~rowdenw/crypt/Mix/draft-moeller-v3-01.txt

  12. Pfitzmann, A., Kohntopp, M.: Anonymity, unobservability and pseudonymity—a proposal for terminology. In: Designing Privacy Enhancing Technologies: Proceedings of the International Workshop on the Design Issues in Anonymity and Observability, pp. 1–9 (July 2000)

    Google Scholar 

  13. Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Privacy Enhacing Technologies, LNCS, San Francisco, CA (April 2002)

    Google Scholar 

  14. Serjantov, A., Dingledine, R., Syverson, P.: From a trickle to a flood: Active attacks on several mix types. In: Petitcolas, F. (ed.) Information Hiding Workshop (October 2002)

    Google Scholar 

  15. Serjantov, A., Newman, R.E.: On the anonymity of timed pool mixes. In: Workshop on Privacy and Anonymity in Networked and Distributed Systems (18th IFIP International Information Security Conference), Athens, Greece (May 2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Díaz, C., Preneel, B. (2004). Reasoning About the Anonymity Provided by Pool Mixes That Generate Dummy Traffic. In: Fridrich, J. (eds) Information Hiding. IH 2004. Lecture Notes in Computer Science, vol 3200. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30114-1_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30114-1_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-24207-9

  • Online ISBN: 978-3-540-30114-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics