AnoA: A Framework for Analyzing Anonymous Communication Protocols
Protecting individuals' privacy in online communications has become a challenge of paramount importance. To this end, anonymous communication (AC) protocols such as the widely used Tor network have been designed to provide anonymity to their participating users. While AC protocols have been the...
Saved in:
Published in | Proceedings - Computer Security Foundations Workshop pp. 163 - 178 |
---|---|
Main Authors | , , , , |
Format | Conference Proceeding |
Language | English |
Published |
Authors, as per new IEEE copyright agreement
01.06.2013
|
Subjects | |
Online Access | Get full text |
ISSN | 1063-6900 |
DOI | 10.1109/CSF.2013.18 |
Cover
Loading…
Abstract | Protecting individuals' privacy in online communications has become a challenge of paramount importance. To this end, anonymous communication (AC) protocols such as the widely used Tor network have been designed to provide anonymity to their participating users. While AC protocols have been the subject of several security and anonymity analyses in the last years, there still does not exist a framework for analyzing complex systems such as Tor and their different anonymity properties in a unified manner. In this work we present AnoA: a generic framework for defining, analyzing, and quantifying anonymity properties for AC protocols. AnoA relies on a novel relaxation of the notion of (computational) differential privacy, and thereby enables a unified quantitative analysis of well-established anonymity properties, such as sender anonymity, sender unlinkability, and relationship anonymity. While an anonymity analysis in AnoA can be conducted in a purely information theoretical manner, we show that the protocol's anonymity properties established in AnoA carry over to secure cryptographic instantiations of the protocol. We exemplify the applicability of AnoA for analyzing real-life systems by conducting a thorough analysis of the anonymity properties provided by the Tor network against passive attackers. Our analysis significantly improves on known anonymity results from the literature. |
---|---|
AbstractList | Protecting individuals' privacy in online communications has become a challenge of paramount importance. To this end, anonymous communication (AC) protocols such as the widely used Tor network have been designed to provide anonymity to their participating users. While AC protocols have been the subject of several security and anonymity analyses in the last years, there still does not exist a framework for analyzing complex systems such as Tor and their different anonymity properties in a unified manner. In this work we present AnoA: a generic framework for defining, analyzing, and quantifying anonymity properties for AC protocols. AnoA relies on a novel relaxation of the notion of (computational) differential privacy, and thereby enables a unified quantitative analysis of well-established anonymity properties, such as sender anonymity, sender unlinkability, and relationship anonymity. While an anonymity analysis in AnoA can be conducted in a purely information theoretical manner, we show that the protocol's anonymity properties established in AnoA carry over to secure cryptographic instantiations of the protocol. We exemplify the applicability of AnoA for analyzing real-life systems by conducting a thorough analysis of the anonymity properties provided by the Tor network against passive attackers. Our analysis significantly improves on known anonymity results from the literature. |
Author | Backes, Michael Meiser, Sebastian Manoharan, Praveen Mohammadi, Esfandiar Kate, Aniket |
Author_xml | – sequence: 1 givenname: Michael surname: Backes fullname: Backes, Michael email: backes@cs.uni-saarland.de – sequence: 2 givenname: Aniket surname: Kate fullname: Kate, Aniket email: aniket@mmci.uni-saarland.de – sequence: 3 givenname: Praveen surname: Manoharan fullname: Manoharan, Praveen email: manoharan@cs.uni-saarland.de – sequence: 4 givenname: Sebastian surname: Meiser fullname: Meiser, Sebastian email: meiser@cs.uni-saarland.de – sequence: 5 givenname: Esfandiar surname: Mohammadi fullname: Mohammadi, Esfandiar email: mohammadi@cs.uni-saarland.de |
BookMark | eNotzE1LwzAcgPEIE9zmTh695Au0_pM0b95CsSoMFNTzSNNEgm0i6YbUT6-gp-d3ejZolXLyCF0RqAkBfdO-dDUFwmqiztAGpNCcAyN0hdYEBKuEBrhAu3mOPVAhBROUrpExKZtbbHBX7OS_cvnAIRdskh2X75jef5XTMuXTjNs8TacUnT3GnPBzycfs8jhfovNgx9nv_rtFb93da_tQ7Z_uH1uzryKhUlWcDE4TaYWnXgblG8eHJjCptbKDpLSBBqTqdeNsANkPQQUrvVIsSC6sd2yLrv--0Xt_-CxxsmU5CK65opL9AHvfSoo |
CODEN | IEEPAD |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/CSF.2013.18 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISBN | 0769550312 9780769550312 |
EndPage | 178 |
ExternalDocumentID | 6595827 |
Genre | orig-research |
GroupedDBID | 29G 29N 29O 6IE 6IK 6IL AAJGR ALMA_UNASSIGNED_HOLDINGS CBEJK IPLJI M43 RIE RIL RNS |
ID | FETCH-LOGICAL-i1278-51dc917a6e2e7f8e4c5d4f37998ad722404078b94caf07bdf8fa7e883f756aec3 |
IEDL.DBID | RIE |
ISSN | 1063-6900 |
IngestDate | Wed Aug 27 02:46:38 EDT 2025 |
IsDoiOpenAccess | false |
IsOpenAccess | true |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i1278-51dc917a6e2e7f8e4c5d4f37998ad722404078b94caf07bdf8fa7e883f756aec3 |
OpenAccessLink | https://ieeexplore.ieee.org/ielx7/6595339/6595809/06595827.pdf |
PageCount | 16 |
ParticipantIDs | ieee_primary_6595827 |
PublicationCentury | 2000 |
PublicationDate | 2013-June |
PublicationDateYYYYMMDD | 2013-06-01 |
PublicationDate_xml | – month: 06 year: 2013 text: 2013-June |
PublicationDecade | 2010 |
PublicationTitle | Proceedings - Computer Security Foundations Workshop |
PublicationTitleAbbrev | csf |
PublicationYear | 2013 |
Publisher | Authors, as per new IEEE copyright agreement |
Publisher_xml | – name: Authors, as per new IEEE copyright agreement |
SSID | ssib026763622 ssj0019972 |
Score | 1.7259338 |
Snippet | Protecting individuals' privacy in online communications has become a challenge of paramount importance. To this end, anonymous communication (AC) protocols... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 163 |
SubjectTerms | anonymity analysis Computational modeling Cryptography differential privacy Educational institutions Games Privacy Protocols relationship anonymity Tor unlinkability |
Title | AnoA: A Framework for Analyzing Anonymous Communication Protocols |
URI | https://ieeexplore.ieee.org/document/6595827 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEA5tT56qtuKbHDya7WaTzcNbKS5FqAha6K1ssgmIYEW3l_56J_vygQdvS2A3ITvD5Mt88w1CV5oLlRYiJ6nWhnBPOYEo6ImjGtwcTuS0Ekla3Iv5kt-t0lUPXXe1MM65inzmovBY5fKLjd2Gq7JJ0L5TieyjPphZXavV2k4iwFFE0klHBf5EnekUjAACjJvaPBrryewxC5wuFoVOH996qlQhJRuiRbuYmknyEm1LE9ndL53G_652H42_ivfwQxeWDlDPvR6iYdu9ATfOPEJTQP7TGzzFWcvPwnCAxZVKyQ7exN3NAP5RRRI-Xm7Afj7GaJndPs3mpGmoQJ5pAmgxpYUFeJYLlzjpleM2LbhnEiBXXsgQ3ENWz2hucx9LU3jlc-mUYl6mIneWHaEBTO2OEbbCaCuslkYILrUxMadUWiZiowwT7ASNwo6s32rNjHWzGad_D5-hvaRuM0Fieo4G5fvWXUCwL81l9Zc_AUPRpp4 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFH7MedDT1E38bQ4eTde0adJ4G8MydRuCG-w2mjQBEZxod9lfb9Jf_sCDt1JoG9I8vry87_sewJWgLI4yluJICImpIRRbFDRYE2HD3O7ISWGSNJmy0ZzeL6JFC64bLYzWuiCfac9dFrX8bKXW7qis77zv4oBvwbbFfRqVaq169QTMhgoLGvMox6Aoa50sxDYH9Ct1HvFFf_iUOFZX6LleH9-6qhSgknRgUg-n5JK8eOtcemrzy6nxv-Pdg96XfA89NsC0Dy39egCdun8DqsK5CwOb-w9u0AAlNUML2S0sKnxKNvZJ1JwNoB86EvfyfGVX0EcP5sntbDjCVUsF_EwCmy9GJFM2QUuZDjQ3saYqyqgJuU260ow7eHd1PSmoSo3PZWZik3Idx6HhEUu1Cg-hbT-tjwApJoViSnDJGOVCSp8SwlXIfBnLkIXH0HUzsnwrXTOW1WSc_H37EnZGs8l4Ob6bPpzCblA2ncA-OYN2_r7W5xb6c3lR_PFPMKOp6w |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=proceeding&rft.title=Proceedings+-+Computer+Security+Foundations+Workshop&rft.atitle=AnoA%3A+A+Framework+for+Analyzing+Anonymous+Communication+Protocols&rft.au=Backes%2C+Michael&rft.au=Kate%2C+Aniket&rft.au=Manoharan%2C+Praveen&rft.au=Meiser%2C+Sebastian&rft.date=2013-06-01&rft.pub=Authors%2C+as+per+new+IEEE+copyright+agreement&rft.issn=1063-6900&rft.spage=163&rft.epage=178&rft_id=info:doi/10.1109%2FCSF.2013.18&rft.externalDocID=6595827 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1063-6900&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1063-6900&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1063-6900&client=summon |