Filters








17 Hits in 3.0 sec

Atom: Horizontally Scaling Strong Anonymity [article]

Albert Kwon, Henry Corrigan-Gibbs, Srinivas Devadas, Bryan Ford
2017 arXiv   pre-print
Atom is an anonymous messaging system that protects against traffic-analysis attacks.  ...  Atom is most suitable for sending a large number of short messages, as in a microblogging application or a high-security communication bootstrapping ("dialing") for private messaging systems.  ...  Conclusion Atom is a traffic-analysis resistant anonymous messaging system that scales horizontally.  ... 
arXiv:1612.07841v3 fatcat:6bvpcxo3sfh4vmftukvhtvs5dq

The Loopix Anonymity System [article]

Ania Piotrowska and Jamie Hayes and Tariq Elahi and Sebastian Meiser and George Danezis
2017 arXiv   pre-print
Loopix leverages cover traffic and brief message delays to provide anonymity and achieve traffic analysis resistance, including against a global network adversary.  ...  , and to concentrate cover traffic.  ...  Delay, cover and real traffic can be flexibly traded-off against each other to offer resistance to traffic analysis.  ... 
arXiv:1703.00536v1 fatcat:hvr75jd2wvcalht4zl23mv7m4e

With a Little Help from My Friends: Transport Deniability for Instant Messaging [article]

Boel Nelson, Aslan Askarov
2022 arXiv   pre-print
Traffic analysis for instant messaging (IM) applications continues to pose an important privacy challenge.  ...  Deniable messages' network traffic can then be explained by a plausible cover story. DenIM achieves overhead proportional to the messages sent, as opposed to scaling with time or number of users.  ...  In particular, round-based protocols [80, 15, 74, 43] , where predetermined rounds make traffic patterns indistinguishable, are able to resist traffic analysis.  ... 
arXiv:2202.02043v1 fatcat:m6h6jvuetbfdrlv2rnhn47qwdm

DAENet: Making Strong Anonymity Scale in a Fully Decentralized Network

Tianxiang Shen, Jianyu Jiang, Yunpeng Jiang, Xusheng Chen, Ji Qi, Shixiong Zhao, Fengwei Zhang, Xiapu Luo, Heming Cui
2021 IEEE Transactions on Dependable and Secure Computing  
., Loopix [7], Dissent [14], Karaoke [15], Riposte [16], Miranda [17]) are established to resist traffic analysis attacks.  ...  In practice, it is desirable for an anonymous system to meet three requirements: lowlatency, resisting traffic analysis attacks and resisting targeted Denial-of-Service (DoS) attacks.  ...  Loopix [7] uses cover traffic and Poisson mixing mechanism to defend against passive traffic analysis attacks, and is more scalable than Vuvuzela by using parallel mix servers.  ... 
doi:10.1109/tdsc.2021.3052831 fatcat:dggaab67nnaadddrtvegsdvlse

PriFi: Low-Latency Anonymity for Organizational Networks [article]

Ludovic Barman, Italo Dacosta, Mahdi Zamani, Ennan Zhai, Apostolos Pyrgelis, Bryan Ford, Jean-Pierre Hubaux, Joan Feigenbaum
2021 arXiv   pre-print
Organizational networks are vulnerable to traffic-analysis attacks that enable adversaries to infer sensitive information from the network traffic - even if encryption is used.  ...  We present PriFi, an anonymous communication protocol for LANs, which protects users against eavesdroppers and provides high-performance traffic-analysis resistance.  ...  Taranet provides traffic-analysis resistance through traffic shaping [9] . 0.48em Mix Networks.  ... 
arXiv:1710.10237v9 fatcat:ico7au4cyfbmrhrivhu6ik36hu

PriFi: Low-Latency Anonymity for Organizational Networks

Ludovic Barman, Italo Dacosta, Mahdi Zamani, Ennan Zhai, Apostolos Pyrgelis, Bryan Ford, Joan Feigenbaum, Jean-Pierre Hubaux
2020 Proceedings on Privacy Enhancing Technologies  
against eavesdroppers and provides high-performance traffic-analysis resistance.  ...  AbstractOrganizational networks are vulnerable to trafficanalysis attacks that enable adversaries to infer sensitive information fromnetwork traffic—even if encryption is used.  ...  Taranet provides traffic-analysis resistance through traffic shaping [12] . Ricochet [7] and Pond [45] are messaging systems that build on Tor. Mix Networks.  ... 
doi:10.2478/popets-2020-0061 fatcat:a2gsonuuafbshb6rmbtm2csa3q

Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency - Choose Two

Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, Aniket Kate
2018 2018 IEEE Symposium on Security and Privacy (SP)  
To achieve strong resistance against compromised servers, Vuvuzela takes a path through all servers, resulting in a latency overhead of ∈ θ(K) (for K servers).  ...  Additionally, Vuvuzela utilizes constant traffic, leading to a bandwidth overhead of β ∈ θ(N/N), and has the potential for strong anonymity. Riffle.  ...  And hence, the analysis focuses on the delivery times of messages for R 1−b . 1) Case c ≥ . We know, ≥ t holds by definition.  ... 
doi:10.1109/sp.2018.00011 dblp:conf/sp/Das0MK18 fatcat:vvctjkwvzvf7zoxha76zhsihbi

BPRF: Blockchain-based privacy-preserving reputation framework for participatory sensing systems

Hyo Jin Jo, Wonsuk Choi, Gorjan Alagic
2019 PLoS ONE  
The performance evaluation and security analysis show that our solution is both practical and able to satisfy the two requirements for user privacy and data trustworthiness.  ...  Due to the high sensitivity of this information, participatory sensing applications need a privacy-preserving mechanism, such as anonymity, to secure and protect personal user data.  ...  Users and applications are assumed to be connected by anonymous communication channels (e.g., Tor [23] , or traffic analysis resistant networks like Dissent [24] and Vuvuzela [25] ).  ... 
doi:10.1371/journal.pone.0225688 pmid:31805089 pmcid:PMC6894850 fatcat:vzrgiqyuorgj3omtv7gpl33vcu

JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT [article]

Sam Kumar, Yuncong Hu, Michael P Andersen, Raluca Ada Popa, David E. Culler
2020 arXiv   pre-print
Furthermore, JEDI allows principals to delegate their keys, restricted in expiry or scope, to other principals, thereby granting access to data and managing access control in a scalable, distributed way  ...  We apply JEDI to an existing IoT messaging system and demonstrate that its overhead is modest.  ...  We would also like to thank students from the RISE Security Group and BETS Research Group for giving us feedback on early drafts of this paper.  ... 
arXiv:1905.13369v2 fatcat:ztf2h7zw5vgglgcr3an7px64b4

Octopus: Privacy-Preserving Collaborative Evaluation of Loan Stacking [article]

Yi Li, Kevin Gao, Yitao Duan, Wei Xu
2020 arXiv   pre-print
To protect participants privacy and business interests, we want to hide borrower identities and lenders data from the loan originator, while simultaneously verifying that the borrower authorizes the query  ...  Practically, it integrates multiple optimizations to reduce communication and computation overhead.  ...  Vuvuzela: Scalable private mes- saging resistant to traffic analysis. In Proceedings of the 25th Symposium on Operating Systems Principles, pages 137-152. ACM, 2015.  ... 
arXiv:2007.02234v1 fatcat:pskdmt2x5rbpjee5pub7e2bu6q

AOT: Anonymization by Oblivious Transfer [article]

Farid Javani, Alan T. Sherman, Maryland Shared Open Access Repository
2021
Using OT to deliver messages helps AOT resist blending (n−1) attacks and helps AOT preserve receiver anonymity, even if a covert adversary controls all nodes in AOT.  ...  Users play an active role in contributing to the unlinkability of messages: periodically, users initiate requests to AOT to receive dummy messages, such that an adversary cannot distinguish real and dummy  ...  Traffic-analysis attacks AOT resists traffic-analysis attacks through standard message and batch sizes and message reordering. AOT accepts only messages of a fixed size.  ... 
doi:10.13016/m25s0v-5tbc fatcat:2hxleh3kinadfjbsqzqayhjale

Anonymous communication resistant to traffic analysis attacks [article]

Nikolaos Alexopoulos, National Technological University Of Athens, National Technological University Of Athens
2016
Privacy-preserving solutions, like Tor, exist but are susceptible to traffic analysis attacks by a global adversary -that is an adversary that can monitor all network traffic.  ...  It has been used for years by database curators to assure people that statistical analysis of their records cannot expose any individual's private data.  ...  To understand the experiment better, consider an adversary who always chooses x 0 i to contain the row that Alice is sending messages to Bob, and x 1 i to differ only at the specified row (Alice is doing  ... 
doi:10.26240/heal.ntua.9936 fatcat:p4fcyqjibneszphmm4qsv4zaae

Scalable Byzantine Reliable Broadcast (Extended Version) [article]

Rachid Guerraoui and Petr Kuznetsov and Matteo Monti and Matej Pavlovic and Dragos-Adrian Seredinschi and Yann Vonlanthen
2020 arXiv   pre-print
Compared to quorums, samples are significantly smaller in size, leading to a more scalable design.  ...  To the best of our knowledge, this is the first formal analysis of a probabilistic broadcast protocol in the Byzantine fault model.  ...  Vuvuzela: Scalable private messaging resistant to traffic analy- sis. In Proceedings of the 25th Symposium on Operating Systems Prin- ciples, SOSP '15, pages 137-152, New York, NY, USA, 2015. ACM.  ... 
arXiv:1908.01738v2 fatcat:tew2gp5odbgdrolwzzijs3avie

Infrastructure-based Anonymous Communication Protocols in Future Internet Architectures

Chen Chen
2018
In TARANET's setup phase,traffic analysis is thwarted by mixing. In the da [...]  ...  HORNET uses only symmetric cryptography for data forwardingand requires no per-flow state on intermediate routers to achieve high scalability.  ...  Chapter 5 TARANET: Traffic-Analysis Resistant Anonymity Protocol at the Network Layer In this chapter, we propose TARANET, a scalable, high-speed, and traffic-analysis-resistant anonymous communication  ... 
doi:10.1184/r1/7212494 fatcat:gmeythrhr5acxjl2i4nh2kyice

Enhancing user privacy in web services

Jean-Sébastien Légaré
2018
traffic analysis on public key retrieval patterns.  ...  For the purposes of traffic analysis we assume that entities may share traffic data. CLIENT-SIDE TRUSTED COMPUTING BASE.  ... 
doi:10.14288/1.0358013 fatcat:egmn42i4lrgghnjjvy5yya7egu
« Previous Showing results 1 — 15 out of 17 results