2018
DOI: 10.1145/3182658
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Routing in Anonymous Communication Protocols

Abstract: The Internet has undergone dramatic changes in the past 2 decades and now forms a global communication platform that billions of users rely on for their daily activities. While this transformation has brought tremendous benefits to society, it has also created new threats to online privacy, such as omnipotent governmental surveillance. As a result, public interest in systems for anonymous communication has drastically increased. In this work, we survey previous research on designing, developing, and deploying … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
27
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 56 publications
(33 citation statements)
references
References 117 publications
0
27
0
Order By: Relevance
“…To generalize contextual data, data can be generalized by using anonymous communications. [30] review anonymous communication protocols in a number of different scenarios, including anonymous web browsing and hidden web services, both of which would be useful in this situation. Additionally, user and server can insert dummy traffic [25] to make it harder for external attackers to infer that communication is really taking place.…”
Section: Privacy Protections For Location-aware Access Controlmentioning
confidence: 99%
“…To generalize contextual data, data can be generalized by using anonymous communications. [30] review anonymous communication protocols in a number of different scenarios, including anonymous web browsing and hidden web services, both of which would be useful in this situation. Additionally, user and server can insert dummy traffic [25] to make it harder for external attackers to infer that communication is really taking place.…”
Section: Privacy Protections For Location-aware Access Controlmentioning
confidence: 99%
“…Allowed number of challenge rows The Trilemma 28 and Dropping-Bound need only two dif-fering communications (the ones whose senders are switched) in the compared scenarios. Thus, the notions of the Trilemma and Dropping-Bound are also in this regard weaker than the one of the Counting-Bound where multiple (precisely µ max ) differing communications are needed for the attack.…”
Section: A5 Comparing Additional Restrictionsmentioning
confidence: 99%
“…A significant aspect of achieving privacy online is by assuring secure and anonymous communications. Shirazi et al [15] provide insights on several anonymous communication protocols and systems. Nevertheless, the authors emphasize that security and anonymity are conflicting aspects, and there are trade-offs that are still an open research issue -especially between anonymity and performance.…”
Section: Introductionmentioning
confidence: 99%