2007 IEEE Intelligence and Security Informatics 2007
DOI: 10.1109/isi.2007.379497
|View full text |Cite
|
Sign up to set email alerts
|

A Combinatorial Approach to Measuring Anonymity

Abstract: In this paper we define a new metric for quantifying formally define our proposed anonymity metric. We then show the degree of anonymity collectively afforded to users of an how our model can be generalized to include probabilistic anonymous communication system. We show how our metric, information in Section III. We demonstrate how to apply our based on the permanent of a matrix, can be useful in evaluating the amount of information needed by an observer to reveal the metio some common type o me istin iV. In … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
93
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 59 publications
(93 citation statements)
references
References 26 publications
0
93
0
Order By: Relevance
“…Much of the work on anonymity metrics, such as that of Serjantov and Danezis [1] or of Diaz, Seys, Claessens and Preneel [2], has focused on measuring anonymity from the point of view of a single message or user. In contrast, Edman, Sivrikaya and Yener [3] proposed a system-wide metric for measuring an attacker's uncertainty in linking each input message of a system with the corresponding output message it exited the system as. They employ the framework of a complete bipartite graph between the system's input and output messages.…”
Section: Introductionmentioning
confidence: 99%
See 4 more Smart Citations
“…Much of the work on anonymity metrics, such as that of Serjantov and Danezis [1] or of Diaz, Seys, Claessens and Preneel [2], has focused on measuring anonymity from the point of view of a single message or user. In contrast, Edman, Sivrikaya and Yener [3] proposed a system-wide metric for measuring an attacker's uncertainty in linking each input message of a system with the corresponding output message it exited the system as. They employ the framework of a complete bipartite graph between the system's input and output messages.…”
Section: Introductionmentioning
confidence: 99%
“…Edman et al [3] gave metrics for measuring anonymity after two kinds of attacks, which we name as infeasibility and probabilistic attacks. Infeasibility attacks determine infeasibility of some edges in the system's complete bipartite graph and arrive at a reduced graph by removing such edges.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations