Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Paper 2005/132

Formal Notions of Anonymity for Peer-to-peer Networks

Jiejun Kong

Abstract

Providing anonymity support for peer-to-peer (P2P) overlay networks is critical. Otherwise, potential privacy attacks (e.g., network address traceback) may deter a storage source from providing the needed data. In this paper we use this practical application scenario to verify our observation that network-based anonymity can be modeled as a complexity based cryptographic problem. We show that, if the routing process between senders and recipients can be modeled as abstract entities, network-based anonymity becomes an analogy of cryptography. In particular, perfect anonymity facing an unbounded traffic analyst corresponds to Shannon's perfect secrecy facing an unbounded cryptanalyst. More importantly, in this paper we propose Probabilistic Polynomial Route (PPR) model, which is a new polynomially-bounded anonymity model corresponding to the Probabilistic Polynomial Time (PPT) model in cryptography. Afterwards, network-based anonymity attacks are with no exception in BPP. This phenomenon has not been discovered in previous anonymity research.

Note: The PPR anonymity model proposed in this paper is completely different from k-anonymity model in use.

Metadata
Available format(s)
PDF PS
Category
Foundations
Publication info
Published elsewhere. UCLA Computer Science Technical Report CSD-TR050016
Keywords
anonymity
Contact author(s)
jkong @ cs ucla edu
History
2005-05-05: received
Short URL
https://ia.cr/2005/132
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2005/132,
      author = {Jiejun Kong},
      title = {Formal Notions of Anonymity for Peer-to-peer Networks},
      howpublished = {Cryptology {ePrint} Archive, Paper 2005/132},
      year = {2005},
      url = {https://eprint.iacr.org/2005/132}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.