AnoA: A Framework for Analyzing Anonymous Communication Protocols

Protecting individuals' privacy in online communications has become a challenge of paramount importance. To this end, anonymous communication (AC) protocols such as the widely used Tor network have been designed to provide anonymity to their participating users. While AC protocols have been the...

Full description

Saved in:
Bibliographic Details
Published inProceedings - Computer Security Foundations Workshop pp. 163 - 178
Main Authors Backes, Michael, Kate, Aniket, Manoharan, Praveen, Meiser, Sebastian, Mohammadi, Esfandiar
Format Conference Proceeding
LanguageEnglish
Published Authors, as per new IEEE copyright agreement 01.06.2013
Subjects
Online AccessGet full text
ISSN1063-6900
DOI10.1109/CSF.2013.18

Cover

Loading…
Abstract Protecting individuals' privacy in online communications has become a challenge of paramount importance. To this end, anonymous communication (AC) protocols such as the widely used Tor network have been designed to provide anonymity to their participating users. While AC protocols have been the subject of several security and anonymity analyses in the last years, there still does not exist a framework for analyzing complex systems such as Tor and their different anonymity properties in a unified manner. In this work we present AnoA: a generic framework for defining, analyzing, and quantifying anonymity properties for AC protocols. AnoA relies on a novel relaxation of the notion of (computational) differential privacy, and thereby enables a unified quantitative analysis of well-established anonymity properties, such as sender anonymity, sender unlinkability, and relationship anonymity. While an anonymity analysis in AnoA can be conducted in a purely information theoretical manner, we show that the protocol's anonymity properties established in AnoA carry over to secure cryptographic instantiations of the protocol. We exemplify the applicability of AnoA for analyzing real-life systems by conducting a thorough analysis of the anonymity properties provided by the Tor network against passive attackers. Our analysis significantly improves on known anonymity results from the literature.
AbstractList Protecting individuals' privacy in online communications has become a challenge of paramount importance. To this end, anonymous communication (AC) protocols such as the widely used Tor network have been designed to provide anonymity to their participating users. While AC protocols have been the subject of several security and anonymity analyses in the last years, there still does not exist a framework for analyzing complex systems such as Tor and their different anonymity properties in a unified manner. In this work we present AnoA: a generic framework for defining, analyzing, and quantifying anonymity properties for AC protocols. AnoA relies on a novel relaxation of the notion of (computational) differential privacy, and thereby enables a unified quantitative analysis of well-established anonymity properties, such as sender anonymity, sender unlinkability, and relationship anonymity. While an anonymity analysis in AnoA can be conducted in a purely information theoretical manner, we show that the protocol's anonymity properties established in AnoA carry over to secure cryptographic instantiations of the protocol. We exemplify the applicability of AnoA for analyzing real-life systems by conducting a thorough analysis of the anonymity properties provided by the Tor network against passive attackers. Our analysis significantly improves on known anonymity results from the literature.
Author Backes, Michael
Meiser, Sebastian
Manoharan, Praveen
Mohammadi, Esfandiar
Kate, Aniket
Author_xml – sequence: 1
  givenname: Michael
  surname: Backes
  fullname: Backes, Michael
  email: backes@cs.uni-saarland.de
– sequence: 2
  givenname: Aniket
  surname: Kate
  fullname: Kate, Aniket
  email: aniket@mmci.uni-saarland.de
– sequence: 3
  givenname: Praveen
  surname: Manoharan
  fullname: Manoharan, Praveen
  email: manoharan@cs.uni-saarland.de
– sequence: 4
  givenname: Sebastian
  surname: Meiser
  fullname: Meiser, Sebastian
  email: meiser@cs.uni-saarland.de
– sequence: 5
  givenname: Esfandiar
  surname: Mohammadi
  fullname: Mohammadi, Esfandiar
  email: mohammadi@cs.uni-saarland.de
BookMark eNotzE1LwzAcgPEIE9zmTh695Au0_pM0b95CsSoMFNTzSNNEgm0i6YbUT6-gp-d3ejZolXLyCF0RqAkBfdO-dDUFwmqiztAGpNCcAyN0hdYEBKuEBrhAu3mOPVAhBROUrpExKZtbbHBX7OS_cvnAIRdskh2X75jef5XTMuXTjNs8TacUnT3GnPBzycfs8jhfovNgx9nv_rtFb93da_tQ7Z_uH1uzryKhUlWcDE4TaYWnXgblG8eHJjCptbKDpLSBBqTqdeNsANkPQQUrvVIsSC6sd2yLrv--0Xt_-CxxsmU5CK65opL9AHvfSoo
CODEN IEEPAD
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/CSF.2013.18
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 0769550312
9780769550312
EndPage 178
ExternalDocumentID 6595827
Genre orig-research
GroupedDBID 29G
29N
29O
6IE
6IK
6IL
AAJGR
ALMA_UNASSIGNED_HOLDINGS
CBEJK
IPLJI
M43
RIE
RIL
RNS
ID FETCH-LOGICAL-i1278-51dc917a6e2e7f8e4c5d4f37998ad722404078b94caf07bdf8fa7e883f756aec3
IEDL.DBID RIE
ISSN 1063-6900
IngestDate Wed Aug 27 02:46:38 EDT 2025
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i1278-51dc917a6e2e7f8e4c5d4f37998ad722404078b94caf07bdf8fa7e883f756aec3
OpenAccessLink https://ieeexplore.ieee.org/ielx7/6595339/6595809/06595827.pdf
PageCount 16
ParticipantIDs ieee_primary_6595827
PublicationCentury 2000
PublicationDate 2013-June
PublicationDateYYYYMMDD 2013-06-01
PublicationDate_xml – month: 06
  year: 2013
  text: 2013-June
PublicationDecade 2010
PublicationTitle Proceedings - Computer Security Foundations Workshop
PublicationTitleAbbrev csf
PublicationYear 2013
Publisher Authors, as per new IEEE copyright agreement
Publisher_xml – name: Authors, as per new IEEE copyright agreement
SSID ssib026763622
ssj0019972
Score 1.7259338
Snippet Protecting individuals' privacy in online communications has become a challenge of paramount importance. To this end, anonymous communication (AC) protocols...
SourceID ieee
SourceType Publisher
StartPage 163
SubjectTerms anonymity analysis
Computational modeling
Cryptography
differential privacy
Educational institutions
Games
Privacy
Protocols
relationship anonymity
Tor
unlinkability
Title AnoA: A Framework for Analyzing Anonymous Communication Protocols
URI https://ieeexplore.ieee.org/document/6595827
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEA5tT56qtuKbHDya7WaTzcNbKS5FqAha6K1ssgmIYEW3l_56J_vygQdvS2A3ITvD5Mt88w1CV5oLlRYiJ6nWhnBPOYEo6ImjGtwcTuS0Ekla3Iv5kt-t0lUPXXe1MM65inzmovBY5fKLjd2Gq7JJ0L5TieyjPphZXavV2k4iwFFE0klHBf5EnekUjAACjJvaPBrryewxC5wuFoVOH996qlQhJRuiRbuYmknyEm1LE9ndL53G_652H42_ivfwQxeWDlDPvR6iYdu9ATfOPEJTQP7TGzzFWcvPwnCAxZVKyQ7exN3NAP5RRRI-Xm7Afj7GaJndPs3mpGmoQJ5pAmgxpYUFeJYLlzjpleM2LbhnEiBXXsgQ3ENWz2hucx9LU3jlc-mUYl6mIneWHaEBTO2OEbbCaCuslkYILrUxMadUWiZiowwT7ASNwo6s32rNjHWzGad_D5-hvaRuM0Fieo4G5fvWXUCwL81l9Zc_AUPRpp4
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFH7MedDT1E38bQ4eTde0adJ4G8MydRuCG-w2mjQBEZxod9lfb9Jf_sCDt1JoG9I8vry87_sewJWgLI4yluJICImpIRRbFDRYE2HD3O7ISWGSNJmy0ZzeL6JFC64bLYzWuiCfac9dFrX8bKXW7qis77zv4oBvwbbFfRqVaq169QTMhgoLGvMox6Aoa50sxDYH9Ct1HvFFf_iUOFZX6LleH9-6qhSgknRgUg-n5JK8eOtcemrzy6nxv-Pdg96XfA89NsC0Dy39egCdun8DqsK5CwOb-w9u0AAlNUML2S0sKnxKNvZJ1JwNoB86EvfyfGVX0EcP5sntbDjCVUsF_EwCmy9GJFM2QUuZDjQ3saYqyqgJuU260ow7eHd1PSmoSo3PZWZik3Idx6HhEUu1Cg-hbT-tjwApJoViSnDJGOVCSp8SwlXIfBnLkIXH0HUzsnwrXTOW1WSc_H37EnZGs8l4Ob6bPpzCblA2ncA-OYN2_r7W5xb6c3lR_PFPMKOp6w
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=proceeding&rft.title=Proceedings+-+Computer+Security+Foundations+Workshop&rft.atitle=AnoA%3A+A+Framework+for+Analyzing+Anonymous+Communication+Protocols&rft.au=Backes%2C+Michael&rft.au=Kate%2C+Aniket&rft.au=Manoharan%2C+Praveen&rft.au=Meiser%2C+Sebastian&rft.date=2013-06-01&rft.pub=Authors%2C+as+per+new+IEEE+copyright+agreement&rft.issn=1063-6900&rft.spage=163&rft.epage=178&rft_id=info:doi/10.1109%2FCSF.2013.18&rft.externalDocID=6595827
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1063-6900&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1063-6900&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1063-6900&client=summon