A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Atom: Horizontally Scaling Strong Anonymity
[article]
2017
arXiv
pre-print
Atom is an anonymous messaging system that protects against traffic-analysis attacks. ...
Atom is most suitable for sending a large number of short messages, as in a microblogging application or a high-security communication bootstrapping ("dialing") for private messaging systems. ...
Conclusion Atom is a traffic-analysis resistant anonymous messaging system that scales horizontally. ...
arXiv:1612.07841v3
fatcat:6bvpcxo3sfh4vmftukvhtvs5dq
The Loopix Anonymity System
[article]
2017
arXiv
pre-print
Loopix leverages cover traffic and brief message delays to provide anonymity and achieve traffic analysis resistance, including against a global network adversary. ...
, and to concentrate cover traffic. ...
Delay, cover and real traffic can be flexibly traded-off against each other to offer resistance to traffic analysis. ...
arXiv:1703.00536v1
fatcat:hvr75jd2wvcalht4zl23mv7m4e
With a Little Help from My Friends: Transport Deniability for Instant Messaging
[article]
2022
arXiv
pre-print
Traffic analysis for instant messaging (IM) applications continues to pose an important privacy challenge. ...
Deniable messages' network traffic can then be explained by a plausible cover story. DenIM achieves overhead proportional to the messages sent, as opposed to scaling with time or number of users. ...
In particular, round-based protocols [80, 15, 74, 43] , where predetermined rounds make traffic patterns indistinguishable, are able to resist traffic analysis. ...
arXiv:2202.02043v1
fatcat:m6h6jvuetbfdrlv2rnhn47qwdm
DAENet: Making Strong Anonymity Scale in a Fully Decentralized Network
2021
IEEE Transactions on Dependable and Secure Computing
., Loopix [7], Dissent [14], Karaoke [15], Riposte [16], Miranda [17]) are established to resist traffic analysis attacks. ...
In practice, it is desirable for an anonymous system to meet three requirements: lowlatency, resisting traffic analysis attacks and resisting targeted Denial-of-Service (DoS) attacks. ...
Loopix [7] uses cover traffic and Poisson mixing mechanism to defend against passive traffic analysis attacks, and is more scalable than Vuvuzela by using parallel mix servers. ...
doi:10.1109/tdsc.2021.3052831
fatcat:dggaab67nnaadddrtvegsdvlse
PriFi: Low-Latency Anonymity for Organizational Networks
[article]
2021
arXiv
pre-print
Organizational networks are vulnerable to traffic-analysis attacks that enable adversaries to infer sensitive information from the network traffic - even if encryption is used. ...
We present PriFi, an anonymous communication protocol for LANs, which protects users against eavesdroppers and provides high-performance traffic-analysis resistance. ...
Taranet provides traffic-analysis resistance through traffic shaping [9] . 0.48em Mix Networks. ...
arXiv:1710.10237v9
fatcat:ico7au4cyfbmrhrivhu6ik36hu
PriFi: Low-Latency Anonymity for Organizational Networks
2020
Proceedings on Privacy Enhancing Technologies
against eavesdroppers and provides high-performance traffic-analysis resistance. ...
AbstractOrganizational networks are vulnerable to trafficanalysis attacks that enable adversaries to infer sensitive information fromnetwork traffic—even if encryption is used. ...
Taranet provides traffic-analysis resistance through traffic shaping [12] . Ricochet [7] and Pond [45] are messaging systems that build on Tor. Mix Networks. ...
doi:10.2478/popets-2020-0061
fatcat:a2gsonuuafbshb6rmbtm2csa3q
Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency - Choose Two
2018
2018 IEEE Symposium on Security and Privacy (SP)
To achieve strong resistance against compromised servers, Vuvuzela takes a path through all servers, resulting in a latency overhead of ∈ θ(K) (for K servers). ...
Additionally, Vuvuzela utilizes constant traffic, leading to a bandwidth overhead of β ∈ θ(N/N), and has the potential for strong anonymity. Riffle. ...
And hence, the analysis focuses on the delivery times of messages for R 1−b . 1) Case c ≥ . We know, ≥ t holds by definition. ...
doi:10.1109/sp.2018.00011
dblp:conf/sp/Das0MK18
fatcat:vvctjkwvzvf7zoxha76zhsihbi
BPRF: Blockchain-based privacy-preserving reputation framework for participatory sensing systems
2019
PLoS ONE
The performance evaluation and security analysis show that our solution is both practical and able to satisfy the two requirements for user privacy and data trustworthiness. ...
Due to the high sensitivity of this information, participatory sensing applications need a privacy-preserving mechanism, such as anonymity, to secure and protect personal user data. ...
Users and applications are assumed to be connected by anonymous communication channels (e.g., Tor [23] , or traffic analysis resistant networks like Dissent [24] and Vuvuzela [25] ). ...
doi:10.1371/journal.pone.0225688
pmid:31805089
pmcid:PMC6894850
fatcat:vzrgiqyuorgj3omtv7gpl33vcu
JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT
[article]
2020
arXiv
pre-print
Furthermore, JEDI allows principals to delegate their keys, restricted in expiry or scope, to other principals, thereby granting access to data and managing access control in a scalable, distributed way ...
We apply JEDI to an existing IoT messaging system and demonstrate that its overhead is modest. ...
We would also like to thank students from the RISE Security Group and BETS Research Group for giving us feedback on early drafts of this paper. ...
arXiv:1905.13369v2
fatcat:ztf2h7zw5vgglgcr3an7px64b4
Octopus: Privacy-Preserving Collaborative Evaluation of Loan Stacking
[article]
2020
arXiv
pre-print
To protect participants privacy and business interests, we want to hide borrower identities and lenders data from the loan originator, while simultaneously verifying that the borrower authorizes the query ...
Practically, it integrates multiple optimizations to reduce communication and computation overhead. ...
Vuvuzela: Scalable private mes-
saging resistant to traffic analysis. In Proceedings of
the 25th Symposium on Operating Systems Principles,
pages 137-152. ACM, 2015. ...
arXiv:2007.02234v1
fatcat:pskdmt2x5rbpjee5pub7e2bu6q
AOT: Anonymization by Oblivious Transfer
[article]
2021
Using OT to deliver messages helps AOT resist blending (n−1) attacks and helps AOT preserve receiver anonymity, even if a covert adversary controls all nodes in AOT. ...
Users play an active role in contributing to the unlinkability of messages: periodically, users initiate requests to AOT to receive dummy messages, such that an adversary cannot distinguish real and dummy ...
Traffic-analysis attacks AOT resists traffic-analysis attacks through standard message and batch sizes and message reordering. AOT accepts only messages of a fixed size. ...
doi:10.13016/m25s0v-5tbc
fatcat:2hxleh3kinadfjbsqzqayhjale
Anonymous communication resistant to traffic analysis attacks
[article]
2016
Privacy-preserving solutions, like Tor, exist but are susceptible to traffic analysis attacks by a global adversary -that is an adversary that can monitor all network traffic. ...
It has been used for years by database curators to assure people that statistical analysis of their records cannot expose any individual's private data. ...
To understand the experiment better, consider an adversary who always chooses x 0 i to contain the row that Alice is sending messages to Bob, and x 1 i to differ only at the specified row (Alice is doing ...
doi:10.26240/heal.ntua.9936
fatcat:p4fcyqjibneszphmm4qsv4zaae
Scalable Byzantine Reliable Broadcast (Extended Version)
[article]
2020
arXiv
pre-print
Compared to quorums, samples are significantly smaller in size, leading to a more scalable design. ...
To the best of our knowledge, this is the first formal analysis of a probabilistic broadcast protocol in the Byzantine fault model. ...
Vuvuzela: Scalable private messaging resistant to traffic analy-
sis. In Proceedings of the 25th Symposium on Operating Systems Prin-
ciples, SOSP '15, pages 137-152, New York, NY, USA, 2015. ACM. ...
arXiv:1908.01738v2
fatcat:tew2gp5odbgdrolwzzijs3avie
Infrastructure-based Anonymous Communication Protocols in Future Internet Architectures
2018
In TARANET's setup phase,traffic analysis is thwarted by mixing. In the da [...] ...
HORNET uses only symmetric cryptography for data forwardingand requires no per-flow state on intermediate routers to achieve high scalability. ...
Chapter 5 TARANET: Traffic-Analysis Resistant
Anonymity Protocol at the Network Layer In this chapter, we propose TARANET, a scalable, high-speed, and traffic-analysis-resistant anonymous communication ...
doi:10.1184/r1/7212494
fatcat:gmeythrhr5acxjl2i4nh2kyice
Enhancing user privacy in web services
2018
traffic analysis on public key retrieval patterns. ...
For the purposes of traffic analysis we assume that entities may share traffic data. CLIENT-SIDE TRUSTED COMPUTING BASE. ...
doi:10.14288/1.0358013
fatcat:egmn42i4lrgghnjjvy5yya7egu
« Previous
Showing results 1 — 15 out of 17 results