Anonymity Trilemma – not all is lost for anonymity, but quite a lot is.
Debajyoti Das1 Sebastian Meiser2 Esfandiar Mohammadi3 Aniket Kate1
1Purdue University 2Visa Research 3Universitaet zu Luebeck
for anonymity, but quite a lot is. Debajyoti Das 1 Sebastian Meiser 2 - - PowerPoint PPT Presentation
Anonymity Trilemma not all is lost for anonymity, but quite a lot is. Debajyoti Das 1 Sebastian Meiser 2 Esfandiar Mohammadi 3 Aniket Kate 1 1 Purdue University 2 Visa Research 3 Universitaet zu Luebeck Anonymous Communication (AC) Networks
Debajyoti Das1 Sebastian Meiser2 Esfandiar Mohammadi3 Aniket Kate1
1Purdue University 2Visa Research 3Universitaet zu Luebeck
Sender Anonymity
Alice
Bob
2
1 2 3
Mixnets can provide anonymity at the cost of high latency overhead.
3
Anonymity can also be achieved at the cost of high bandwidth overhead.
Alice
Bob
anonymity without introducing large latency or bandwidth overhead?
good anonymity low latency
low bandwidth
IEEE S&P 2018
4
Alice
Eve
Bob
Pr[Eve:“Alice”| Alice sends message] ≤ Pr[Eve:“Alice”| Bob sends message] + δ(η) strong: δ(η) ≤ negl(η)
5
S R Latency overhead l = 4 Bandwidth overhead β = 2/4, B = 2
6
2l (β+p’) = 1
latency l δ = negl(η) bandwidth β
7
2l (β+p’) = 1
latency l 2(l −c)(β+p’)≥ 1 when c>0 bandwidth β
l in θ(1)
8
The protocol model in the previous work did not assume any out-of-band user coordination.
9
Issue: these protocols use very high bandwidth overhead. The overhead (number of dummy messages) per real message, B > (N-1), N = total users.
Alice Eve Bob Charlie
Eve can retrieves the actual message only after combining all three packets.
10
1 2 3
Bob and Charlie send shares for Alice’s message, with some pre-setup, without Alice communicating to them.
Alice Eve Bob Charlie
Eve retrieves the message from Alice only after combining all three packets.
Debo
11
1 2 3
Assumption 1: One of the packets is sent by the actual sender Alice.
Alice Eve1 Eve2 Bob Charlie
12
1 2 3
Assumption 2: One packet does not take part in the reconstruction of two separate messages.
Alice Eve1 Eve2 Bob Charlie
13
1 2 3
Assumption 3: Mixing is not possible at a compromised node.
Alice Eve Bob
14
2l (β+p’) = 1
latency l δ = negl(η) bandwidth β
The universal necessary constraint still holds, except l =0.
15
2l (β+p’) = 1
latency l 2(l −c)β ≥ 1 when c>0
16
17
focus on protocols with user coordination, to at least achieve resistance against compromization.
specified by the universal necessary constraint: 2l (β+p’) ≥ 1.
2l (β+p’) = 1
latency l when c>0 bandwidth β
18
19
X
Still strong anonymity will be impossible for 2l (β+p’) < 1
Challenge 2: Break Assumption 2.
communication overhead and low latency overhead.
20
1 3 Alice Eve1 Eve2 Bob Charlie
@tutaidas das48@purdue.edu
21