Anonymity protocols as noisy channels

被引:84
作者
Chatzikokolaks, Konstantincis [1 ,2 ]
Palamidessi, Catuscia [1 ,2 ]
Panangaden, Prakash [3 ]
机构
[1] Ecole Polytech, INRIA, Palaiseau, France
[2] Ecole Polytech, LIX, Palaiseau, France
[3] McGill Univ, Sch Comp Sci, Montreal, PQ, Canada
关键词
D O I
10.1016/j.ic.2007.07.003
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We consider a framework in which anonymity protocols are interpreted as noisy channels in the information-theoretic sense, and we explore the idea of using the notion of capacity as a measure of the loss of anonymity. Such idea was already suggested by Moskowitz, Newman and Syverson, in their analysis of the covert channel that can be created as a result of non-perfect anonymity. We consider the case in which some leak of information is intended by design, and we introduce the notion of conditional capacity to rule out this factor, thus retrieving a natural correspondence with the notion of anonymity. Furthermore, we show how to compute the capacity and the conditional capacity when the anonymity protocol satisfies certain symmetries. We also investigate how the adversary can test the system to try to infer the user's identity, and we study how his probability of success depends on the characteristics of the channel. We then illustrate how various notions of anonymity can be expressed in this framework, and show the relation with some definitions of probabilistic anonymity in literature. Finally, we show how to compute the matrix of the channel (and hence the capacity and conditional capacity) using model checking. (C) 2007 Elsevier Inc. All rights reserved.
引用
收藏
页码:378 / 401
页数:24
相关论文
共 32 条
  • [1] Bhargava M, 2005, LECT NOTES COMPUT SC, V3653, P171, DOI 10.1007/11539452_16
  • [2] Probability of error in information-hiding protocols
    Chatzikokolakis, Konstantinos
    Palamidessi, Catuscia
    Panangaden, Prakash
    [J]. 20TH IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSFS20), PROCEEDINGS, 2007, : 341 - +
  • [3] Probable innocence revisited
    Chatzikokolakis, Konstantinos
    Palamidessi, Catuscia
    [J]. THEORETICAL COMPUTER SCIENCE, 2006, 367 (1-2) : 123 - 138
  • [4] Chaum D., 1988, Journal of Cryptology, V1, P65, DOI 10.1007/BF00206326
  • [5] CLARK D, 2001, ELECT NOTES THEOR CO, V59, P238
  • [6] Quantified Interference for a While Language
    Clark, David
    Hunt, Sebastian
    Malacaria, Pasquale
    [J]. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 112 : 149 - 166
  • [7] Belief in information flow
    Clarkson, MR
    Myers, AC
    Schneider, FB
    [J]. 18TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2005, : 31 - 45
  • [8] Cover TM, 2006, Elements of Information Theory
  • [9] Weak Probabilistic Anonymity
    Deng, Yuxin
    Palamidessi, Catuscia
    Pang, Jun
    [J]. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2007, 180 (01) : 55 - 76
  • [10] Deng YX, 2007, LECT NOTES COMPUT SC, V4691, P65