Anonymity Trilemma: Anonymity, Low Bandwidth Overhead, Low Latency – Choose Two

https://freedom.cs.purdue.edu/anonymity/index.html

Ebay Products

Anonymity

Anonymity Research

Welcome to the Anonymity Research Webpage!

<!– –>

We design and analyze efficient, provably secure cryptographic solutions for anonymity networks (e.g., Tor) and privacy in the emerging scenarios (e.g., online advertising) over the Internet. Recently, we are also pursuing topics such as finding lower-bounds on communication anonymity, and bootstrapping censorship-evasive communication.

Publications

  • Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency — Choose Two.

    Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi and Aniket Kate.
    To appear at IEEE S&P (Oakland) ’17.
    [PDF]

<!–

Projects

The IoV research team has several projects underway to facilitate moving money worldwide with the same security, privacy and reliability guarantees as information does today. For that, we currently focus on three main aspects of the broad spectrum of Internet of Value, but we are eager to explore the many other dimensions of it.

  • Bitcoin Mixing. Several research works have shown that the supposed
    privacy provided by pseudonyms in Bitcoin is vulnerable to several attacks. In the view of this state of affairs, coin mixing, that is mixing your coins with other Bitcoin users, allows to perform anonymous transactions in a fully compatible manner
    with current Bitcoin system. We have developed mixing protocols that help you to securely mix your coins with other users in the Bitcoin system. Additionally, we have extended this concept to provide the first path mixing protocol that allows anonymous transactions in credit networks.

  • Privacy in Credit Networks. Credit networks such as Ripple allows to perform
    not only same-currency but also inter-currency transactions worldwide in a matter of seconds, therefore overcoming the challenges with traditional banking systems. Nevertheless, credit networks have not received much attention from the research community yet. We fill this gap by providing a thorough privacy study and contributing solutions to enable privacy-preserving transactions in credit networks.

  • Smart Contracts. The enforcement of current contracts between two parties require costly and time consuming procedures (e.g., going into court). Bitcoin smart contracts leverages the current Bitcoin system to create smart contracts, which enable the enforcement of
    a contract established between to parties using the Bitcoin network as an arbitrator, therefore
    reducing costs and time with traditional contract enforcement mechanisms. In our research we contribute
    smart contracts for several applications such as non-equivocation contracts and non-disclosure agreements.

–>

Theory of Anonymity

— Anonymity Trilemma

Strong Anonymity, Low Bandwidth Overhead, Low Latency — Choose Two.

This work investigates the fundamental constraints of anonymous communication (AC) protocols.
We analyze the relationship between bandwidth overhead, latency overhead, and sender anonymity or recipient anonymity against the global passive (network-level) adversary.
We confirm the trilemma
that an AC protocol can only achieve two out of the following three properties:
strong anonymity (i.e., anonymity up to a negligible chance),
low bandwidth overhead, and low latency overhead.

We further study anonymity against a stronger global passive adversary that can additionally passively compromise some of the AC protocol nodes.
For a given number of compromised nodes,
we derive necessary constraints between bandwidth and latency overhead whose violation make it impossible for an AC protocol to achieve strong anonymity.
We analyze prominent AC protocols from the literature and depict to which extent those satisfy our necessary constraints.
Our fundamental necessary constraints offer a guideline not only for improving existing AC systems but also for designing novel AC protocols with non-traditional bandwidth and latency overhead choices.

For more information, follow the project webpage.

Anonymity Trilemma

Next Post

How Spotify Saved the Music Industry (But Not Necessarily Musicians) (Ep. 374) - Freakonomics

Fri Apr 12 , 2019
http://freakonomics.com/podcast/spotify/

You May Like