Search Results

1 - 10 of 224 items :

  • "Anonymity" x
Clear All
PHI: Path-Hidden Lightweight Anonymity Protocol at Network Layer

. Berthold, H. Federrath, and S. Köpsell. Web mixes: A system for anonymous and unobservable internet access. In PETS, 2001. [17] S. Chakravarty, M. V. Barbera, G. Portokalidis, M. Polychronakis, and A. D. Keromytis. On the effectiveness of traffic analysis against anonymity networks using flow records. In PAM, 2014. [18] D. Chaum. The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of cryptology, 1(1):65-75, 1988. [19] D. Chaum, F. Javani, A. Kate, A. Krasnova, J. de Ruiter, and A. T

Open access
Anonymity in Peer-assisted CDNs: Inference Attacks and Mitigation

. Madhyastha. Lastor: A lowlatency as-aware tor client. In IEEE S&P, 2012. [31] R. Annessi and M. Schmiedecker. Navigator: Finding faster paths to anonymity. In IEEE Euro S&P, 2016. [32] K. Bauer, D. McCoy, D. Grunwald, and D. Sicker. Bitblender: Light-weight anonymity for bittorrent. In AIPACa, 2008. [33] P. Boucher, A. Shostack, and I. Goldberg. Freedom systems 2.0 architecture. Zero Knowledge Systems, Inc, 2000. [34] J. Boyan. The anonymizer: Protecting user privacy on the web. Computer-Mediated Communication

Open access
An Lwe-Based Key Transfer Protocol with Anonymity


We introduce a new cryptographic protocol based on the wellknown LearningWith Errors (LWE) problem: a group key transfer protocol which achieves anonymity of the members against each others. This issue is almost absent in the key transfer protocols from the literature but we argue it is a practical property. We motivate our construction by a practical need. We use two essential cryptographic primitives built from LWE: LWE Diffie-Hellman key exchange derived from Regev’s work [Regev, O.: On lattices, learning with errors, random linear codes, and cryptography, in: Proc. of the 37th Annual ACM Symposium on Theory of Computing-STOC ’05 (H. N. Gabow and R. Fagin, eds.), Baltimore, MD, USA, 2005, ACM, New York, 2005, pp. 84-93] and a public key cryptosystem secure under the LWE hardness. We provide a security definition for anonymous key transfer protocol and we achieve anonymity against IND-CPA adversaries.

Open access
MorphIT: Morphing Packet Reports for Internet Transparency

References [1] AT&T SLA. . [2] CAIDA Traces. . [3] Comcast SLA for Wholesale Dedicated Internet. . [4] Comcast vs. Netflix: Is this really about Net neutrality? . [5] Net neutrality by country. . [6] Tor: Anonymity Online

Open access
Tempest: Temporal Dynamics in Anonymity Systems

References [1] Masoud Akhoondi, Curtis Yu, and Harsha V. Madhyastha. LASTor: A low-latency AS-aware Tor client. In IEEE S&P, 2012. [2] Alexa top 500 sites., 2017. [3] Michael Backes, Sebastian Meiser, and Marcin Slowik. Your Choice MATor(s): Large-scale quantitative anonymity assessment of Tor path selection algorithms against structural attacks. PoPETs, 2016(2), 2016. [4] Armon Barton and Matthew Wright. DeNASA: Destinationnaive AS-awareness in anonymous

Open access
Scalable and Anonymous Group Communication with MTor

. Towards Measuring Anonymity. In Privacy Enhancing Technologies (PET), 2003. [11] R. Dingledine. Research Problem: Better Guard Rotation Parameters, August 2011. Available at https: // parameters. [12] R. Dingledine, N. Mathewson, and P. Syverson. Tor: The Second-Generation Onion Router. In USENIX Security Symposium (USENIX), August 2004. [13] R. Dingledine, N. Hopper, G. Kadianakis, and N. Mathewson. One Fast Guard for Life (or 9 months). In Privacy Enhancing

Open access
A branch hash function as a method of message synchronization in anonymous P2P conversations

-10. Berthold, O., Federrath, H. and Kpsell, S. (2001). Web mixes: A system for anonymous and unobservable internet access, International Workshop on Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, pp. 115-129. Boyd, C., Mao, W. and Paterson, K.G. (2005). Deniable authenticated key establishment for internet protocols, in B. Christianson et al. (Eds.), Security Protocols, Springer, Berlin/Heidelberg, pp. 255-271. Dabek, F., Li, J., Sit, E., Robertson, J., Kaashoek, M. and Morris, R

Open access
Your Choice MATor(s)
Large-scale Quantitative Anonymity Assessment of Tor Path Selection Algorithms Against Structural Attacks

References [1] Ookla’s NetIndex. Accessed July, 2015. [2] Sourcecode of our analysis tool. [3] Tails - live operating system focused on privacy and anonymity. Accessed February, 2015. [4] The Tor blog, announcing the release of tor https: // Accessed August, 2015. [5] Tor Metrics

Open access
DeNASA: Destination-Naive AS-Awareness in Anonymous Communications

:// [6] CAIDA. The CAIDA UCSD IPv4 routed /24 topology dataset, June 2015. [7] CAIDA. The CAIDA AS relationships, January 2016. http: // [8] Claudia Diaz, Stefaan Seys, Joris Claessens, and Bart Preneel. Towards measuring anonymity. In PETS, 2003. [9] Roger Dingledine, Nicholas Hopper, George Kadianakis, and Nick Mathewson. One fast guard for life (or 9 months). In HotPETs, 2014. [10] Roger Dingledine

Open access
The Donation of Gametes and the Anonimity of the Donors

References 1. ESHRE Task Force on Ethics and Law III Gamete and embryo donation - Human Reproduction, 2002; 17(5): 1407-1408. 2. McWhinnie A. Gamete donation and anonymity, Hum Reprod, 2001; 16(5): 807-817. 3. Hill M (2002) Sperm donors “want to keep anonymity”. BBC News. Available from 4. Brett S, Sacranie RR, Thomas GE, and Rajkhowa R. Can we improve recruitment of oocyte donors with loss of donor anonymity? A hospital-based survey. Hum Fertil (Camb

Open access