Evaluating Mixing Methods: Anonymity, Long-Term Information Leakage, and Cost

被引:0
作者
Aksoy, Alperen [1 ]
Kesdogan, Dogan [2 ]
机构
[1] Friedrich Alexander Univ Erlangen Nurnberg, Lehrstuhl Informat 1, D-91054 Erlangen, Germany
[2] Univ Regensburg, Lehrstuhl Wirtschaftsinformat 4, D-93053 Regensburg, Germany
关键词
Protection; Costs; Information leakage; Entropy; Measurement; Delays; Privacy; Exponential distribution; Bandwidth; Electronic mail; Anonymity; Mix-nets; privacy and cost evaluation; communication networks; TRAFFIC ANALYSIS;
D O I
10.1109/ACCESS.2025.3584267
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mix-nets are essential tools for safeguarding user privacy in communication networks. When deploying systems, two well-known mixing methods, batch (e.g., Timed Mix) and continuous mixing (e.g., Stop-and-Go Mix), are commonly used in real-world Mix-nets. However, no comprehensive study has evaluated the impact of these methods on anonymity, long-term information leakage, and the cost associated with dummy message overhead. To address this gap, this study provides a comprehensive analysis of these mixing methods. To this end, anonymity set size and entropy metrics are used to evaluate the anonymity protection of individual messages. The applicability of the Statistical Disclosure Attack (SDA) is extended to evaluate long-term information leakage for both mixing methods, and the closed-loop control anonymity protection model is adapted to measure the cost of anonymity protection in terms of the dummy message overhead. The experimental results show that continuous mixes provide stronger anonymity protection for individual messages-yielding up to 10% higher entropy under the default experimental settings. However, both long-term information leakage and the cost of achieving the desired protection are generally higher in continuous mixes, especially under high traffic scenarios. For example, under the default experimental settings, completing the SDA requires 1.5 times more observations in batch mixing than in continuous mixing and achieves the desired protection with 49% less cost in terms of the dummy message usage. These findings highlight the importance of selecting appropriate mixing method to balance anonymity, long-term information leakage, and cost in anonymous communication systems.
引用
收藏
页码:113028 / 113048
页数:21
相关论文
共 54 条
[1]  
Agrawal D., 2003, IEEE Security & Privacy, V1, P27, DOI 10.1109/MSECP.2003.1253565
[2]  
Aksoy Alperen, 2025, Security and Trust Management: 20th International Workshop, STM 2024, Bydgoszcz, Poland, September 19-20, 2024, Proceedings. Lecture Notes in Computer Science (15235), P21, DOI 10.1007/978-3-031-76371-7_2
[3]  
Aksoy A., 2024, P 17 INT C INF SEC C, P1
[4]   Effect of Group Based Synchronization on User Anonymity in Mix Networks [J].
Aksoy, Alperen ;
Kesdogan, Dogan .
18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
[5]  
[Anonymous], 2025, Katzenpost Documentation
[6]  
Barman L, 2022, PROCEEDINGS OF THE 16TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, OSDI 2022, P735
[7]  
Ben Guirat I., 2023, P PRIV ENH TECHN, P464
[8]  
Chaum D., 1988, Journal of Cryptology, V1, P65, DOI 10.1007/BF00206326
[9]   UNTRACEABLE ELECTRONIC MAIL, RETURN ADDRESSES, AND DIGITAL PSEUDONYMS [J].
CHAUM, DL .
COMMUNICATIONS OF THE ACM, 1981, 24 (02) :84-88
[10]   Private information retrieval [J].
Chor, B ;
Goldreich, O ;
Kushilevitz, E ;
Sudan, M .
JOURNAL OF THE ACM, 1998, 45 (06) :965-982