Security Analysis of Accountable Anonymity in Dissent

被引:10
作者
Syta, Ewa [1 ]
Corrigan-Gibbs, Henry [1 ]
Weng, Shu-Chun [1 ]
Wolinsky, David [1 ]
Ford, Bryan [1 ]
Johnson, Aaron [2 ]
机构
[1] Yale Univ, New Haven, CT 06520 USA
[2] US Navy, Res Lab, Arlington, VA USA
关键词
Algorithms; Security; Anonymous communication; accountable anonymity; provable security; DINING CRYPTOGRAPHERS; MIX; ATTACKS; BREAK; FLAWS;
D O I
10.1145/2629621
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Users often wish to communicate anonymously on the Internet, for example, in group discussion or instant messaging forums. Existing solutions are vulnerable to misbehaving users, however, who may abuse their anonymity to disrupt communication. Dining Cryptographers Networks ( DC-nets) leave groups vulnerable to denial-of-service and Sybil attacks; mix networks are difficult to protect against traffic analysis; and accountable voting schemes are unsuited to general anonymous messaging. DISSENT is the first general protocol offering provable anonymity and accountability for moderate-size groups, while efficiently handling unbalanced communication demands among users. We present an improved and hardened DISSENT protocol, define its precise security properties, and offer rigorous proofs of these properties. The improved protocol systematically addresses the delicate balance between provably hiding the identities of well-behaved users, while provably revealing the identities of disruptive users, a challenging task because many forms of misbehavior are inherently undetectable. The new protocol also addresses several nontrivial attacks on the original DISSENT protocol stemming from subtle design flaws.
引用
收藏
页数:35
相关论文
共 60 条
  • [1] Flaws in robust optimistic mix-nets and stronger security notions
    Abe, M
    Imai, H
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (01) : 99 - 105
  • [2] Abe M, 2003, LECT NOTES COMPUT SC, V2727, P39
  • [3] ADIDA B, 2006, THESIS MIT CAMBRIDGE
  • [4] Allepuz Jordi Puiggali, 2010, P 4 INT C EL VOT
  • [5] [Anonymous], 2005, Cryptography: Theory and Practice
  • [6] [Anonymous], 2004, P 13 C USENIX SEC S, DOI [DOI 10.5555/1251375.1251396, DOI 10.1186/1476-0711-3-21]
  • [7] [Anonymous], 2003, P 10 ACM C COMP COMM
  • [8] [Anonymous], 1999, P 3 S OP SYST DES IM
  • [9] [Anonymous], 2007, NY TIMES
  • [10] [Anonymous], 1961, The Yale Law Journal, V70, P1084, DOI DOI 10.2307/794351?REF=SEARCH-GATEWAY:25503CF11024A2CA9E983E06AF9B2DC9