2019
DOI: 10.1109/access.2019.2919322
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Measuring Anonymity in Anonymous Communication Systems

Abstract: The popularity of Internet applications has made communication privacy an increasingly important security requirement. As an important aspect of privacy, anonymity ensures that a subject may use resources or services without disclosing user identity or corresponding relationships. Since the seminal work by Chaum for anonymous communication, many different anonymous communication systems, and anonymous protocols have been developed and investigated extensively. In recent years, anonymous communication systems h… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 148 publications
0
8
0
Order By: Relevance
“…Crowds [30], Hordes [52], LASTor [53], Torsk [54], Highspeed Onion Routing at the Network Layer (HORNET) [55], and Non-interactive Anonymous Router (NIAR) [56] are based on onion routing as well. Crowds was specially designed to hide a specific user's action within the actions of many others during web browsing [30], [57], [58]. Instead of operating a set of onion routers, Crowds' clients relay the traffic of others.…”
Section: Onion Routing Based Solutionsmentioning
confidence: 99%
“…Crowds [30], Hordes [52], LASTor [53], Torsk [54], Highspeed Onion Routing at the Network Layer (HORNET) [55], and Non-interactive Anonymous Router (NIAR) [56] are based on onion routing as well. Crowds was specially designed to hide a specific user's action within the actions of many others during web browsing [30], [57], [58]. Instead of operating a set of onion routers, Crowds' clients relay the traffic of others.…”
Section: Onion Routing Based Solutionsmentioning
confidence: 99%
“…Then, When receiving the EAP request/identity message for the first time in the authentication phase, WLAN-UE inputs and and computes 0 , and IMSI according to formula (21)(22)(23)(24), generates identity index , temporary identity HMSI and shared secret key recorded as 1 , HMSI 1 and 1 according to formula (25)(26)(27) for the next round of authentication.…”
Section: Improved Scheme For Identity Privacy Protectionmentioning
confidence: 99%
“…In previous researches, many researchers devoted on evaluating and quantifying the anonymity of anonymous communication protocols and systems [24]. The efforts on the formalization of anonymity can be divided into methods based on process calculi [25], epistemic logic [26], UC framework [27], differential privacy [28], probabilistic automata [29,30] and I/O automata [31].…”
Section: B Security Proof On Anonymitymentioning
confidence: 99%
“…According to the existing literature [5], [32], [33], BCMIX needs to satisfy the following fundamental security requirements.…”
Section: Security Requirementsmentioning
confidence: 99%
“…Aiming to preserve communication privacy within the shared public network environment, anonymous communication mainly focus on how to hide the identities or address information of one side or both sides in communications. Since the seminal work by Chaum [4] for anonymous communication, more than seventy anonymous systems have been proposed, based on different anonymous mechanism [5]. Generally, anonymous systems can be divided into the following sub-types, mix re-encryption, multicast/broadcast, mix multi-layer encryption and peer-to-peer.…”
Section: Introductionmentioning
confidence: 99%