Weak Probabilistic Anonymity

被引:11
作者
Deng, Yuxin [1 ]
Palamidessi, Catuscia [2 ]
Pang, Jun [2 ]
机构
[1] Univ Paris 07, INRIA Sophia Antipolis, F-75221 Paris 05, France
[2] Ecole Polytechn, INRIA Futurs & LIX, Palaiseau, France
关键词
Anonymity; Probability; Nondeterminism; Dining Cryptographers;
D O I
10.1016/j.entcs.2005.05.047
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Anonymity means that the identity of the user performing a certain action is maintained secret. The protocols for ensuring anonymity often use random mechanisms which can be described probabilistically. In this paper we propose a notion of weak probabilistic anonymity, where weak refers to the fact that some amount of probabilistic information may be revealed by the protocol. This information can be used by an observer to infer the likeliness that the action has been performed by a certain user. The aim of this work is to study the degree of anonymity that the protocol can still ensure, despite the leakage of information. We illustrate our ideas by using the example of the dining cryptographers with biased coins. We consider both the cases of nondeterministic and probabilistic users. Correspondingly, we propose two notions of weak anonymity and we investigate their respective dependencies on the biased factor of the coins.
引用
收藏
页码:55 / 76
页数:22
相关论文
共 15 条
[1]   Reactive modules [J].
Alur, R ;
Henzinger, TA .
FORMAL METHODS IN SYSTEM DESIGN, 1999, 15 (01) :7-48
[2]  
Alur R., 1999, LECT NOTES COMPUTER, V15, P7
[3]   Model checking for a probabilistic branching time logic with fairness [J].
Baier, C ;
Kwiatkowska, M .
DISTRIBUTED COMPUTING, 1998, 11 (03) :125-155
[4]  
Bhargava Mohit, 2005, P CONCUR 20 IN PRESS
[5]  
Bianco A., 1995, LNCS, V1026, P499, DOI DOI 10.1007/3-540-60692-0
[6]  
Chaum D., 1988, Journal of Cryptology, V1, P65, DOI 10.1007/BF00206326
[7]   Anonymity and information hiding in multiagent systems [J].
Halpern, JY ;
O'Neill, KR .
16TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2003, :75-88
[8]  
Hansson H., 1994, Formal Aspects of Computing, V6, P512, DOI 10.1007/BF01211866
[9]  
KESDOGAN D, 1998, LNCS, V1525
[10]  
Kwiatkowska M, 2002, LECT NOTES COMPUT SC, V2324, P200