کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
425983 685976 2015 37 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Analyzing anonymity attacks through noisy channels
ترجمه فارسی عنوان
تجزیه و تحلیل حملات ناشناس با استفاده از کانال های پر سر و صدا
کلمات کلیدی
پروتکل های گمنامی؛ تئوری اطلاعات؛ نشت اطلاعات؛ تجزیه و تحلیل امنیت
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر نظریه محاسباتی و ریاضیات
چکیده انگلیسی

Anonymity protocols focus on protecting the identities of senders and/or receivers in a network communication. Most of these protocols rely on randomness to achieve their goal and therefore can very well be represented as noisy channels in the information theoretic sense. In this paper we examine the problem of measuring the anonymity degree of anonymity protocols. We investigate a new idea of measuring anonymity based on how much the rows of the channel probabilities matrix are different from each other. We propose a new and generic approximation algorithm for the open problem of finding where anonymity of a given protocol is minimized. We illustrate how the probabilities matrix is constructed for some known anonymity protocols and we use the information leakage measures to study known attacks on those protocols. The analysis shows counter intuitive results in particular for Timed dynamic pool (Cottrell) mixes. Finally, we discuss the applicability of the proposed measures on Tor Network.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Information and Computation - Volume 244, October 2015, Pages 76–112
نویسندگان
,