The Future of Identity in the Information Society 2008
DOI: 10.1007/978-0-387-79026-8_23
|View full text |Cite
|
Sign up to set email alerts
|

On the Fundamentals of Anonymity Metrics

Abstract: In recent years, a handful of anonymity metrics have been proposed that are either based on (i) the number participants in the given scenario, (ii) the probability distribution in an anonymous network regarding which participant is the sender / receiver, or (iii) a combination thereof. In this paper, we discuss elementary properties of metrics in general and anonymity metrics in particular, and then evaluate the behavior of a set of state-of-the-art anonymity metrics when applied in a number of scenarios. On t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2008
2008
2018
2018

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(11 citation statements)
references
References 14 publications
(25 reference statements)
0
11
0
Order By: Relevance
“…Metrics for anonymity have been compared [9], [10], but both works do not consider the requirements of surveillance systems. A detailed description of them would go beyond this work.…”
Section: B Metrics For Anonymizationmentioning
confidence: 99%
“…Metrics for anonymity have been compared [9], [10], but both works do not consider the requirements of surveillance systems. A detailed description of them would go beyond this work.…”
Section: B Metrics For Anonymizationmentioning
confidence: 99%
“…[3]- [14]). From this literature it is evident that one is typically interested to measure multiple aspects of the protection of privacy that is provided by a system.…”
Section: Related Workmentioning
confidence: 99%
“…2 In this paper, we restrict our attention to systems that hide a binary relation over a given set. 3 We do not distinguish between passive and active adversaries.…”
Section: Relation Hidingmentioning
confidence: 99%
See 1 more Smart Citation
“…In particular, the parameter space for voting system as A 2 vs = N, where N is the identifier set of eligible voters, and C is used as the set of users. In particular, on reception of an input((c 0 , u 0 ), (c 1 , u 1 )) query, the challenger invokes the system 3 We are unaware of any formal treatments of ballot secrecy in the literature; our formal model below follows the intuition provided by the notion of 'perfect ballot secrecy' that is informally described in [28]. 4 These systems do not hide this correspondence in order to provide 'individual verifiability', a property that enables each voter to verify that his own vote has been accounted for in the tally.…”
Section: Lemmamentioning
confidence: 99%