2004.

Paper abstract bibtex

Paper abstract bibtex

Anonymous message transmission should be a key feature in network architectures ensuring that delivered messages are impossible-or at least infeasible-to be traced back to their senders. For this purpose the formal model of the non-adaptive, real-time PROB-channel will be introduced. In this model attackers try to circumvent applied protection measures and to link senders to delivered messages. In order to formally measure the level of anonymity provided by the system, the probability will be given, with which observers can determine the senders of delivered messages (source-hiding property) or the recipients of sent messages (destination-hiding property). In order to reduce the certainty of an observer, possible counter-measures will be defined that will ensure specified upper limit for the probability with which an observer can mark someone as the sender or recipient of a message. Finally results of simulations will be shown to demonstrate the strength of the techniques.

@conference {TH04, title = {Measuring Anonymity in a Non-adaptive, Real-time System}, booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)}, series = {Springer-Verlag, LNCS}, volume = {3424}, year = {2004}, pages = {226{\textendash}241}, abstract = {Anonymous message transmission should be a key feature in network architectures ensuring that delivered messages are impossible-or at least infeasible-to be traced back to their senders. For this purpose the formal model of the non-adaptive, real-time PROB-channel will be introduced. In this model attackers try to circumvent applied protection measures and to link senders to delivered messages. In order to formally measure the level of anonymity provided by the system, the probability will be given, with which observers can determine the senders of delivered messages (source-hiding property) or the recipients of sent messages (destination-hiding property). In order to reduce the certainty of an observer, possible counter-measures will be defined that will ensure specified upper limit for the probability with which an observer can mark someone as the sender or recipient of a message. Finally results of simulations will be shown to demonstrate the strength of the techniques.}, isbn = {3-540-26203-2}, url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.77.851}, author = {Gergely T{\'o}th and Zolt{\'a}n Horn{\'a}k} }

Downloads: 0