Proceedings of the 26th Symposium on Operating Systems Principles 2017
DOI: 10.1145/3132747.3132783
|View full text |Cite
|
Sign up to set email alerts
|

Stadium

Abstract: Private communication over the Internet remains a challenging problem. Even if messages are encrypted, it is hard to deliver them without revealing metadata about which pairs of users are communicating. Scalable anonymity systems, such as Tor, are susceptible to traffic analysis attacks that leak metadata. In contrast, the largest-scale systems with metadata privacy require passing all messages through a small number of providers, requiring a high operational cost for each provider and limiting their deployabi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 69 publications
(14 citation statements)
references
References 39 publications
0
6
0
Order By: Relevance
“…However, some existing EEMS attempt to also obscure this metadata in transmitting messages, so that the server does not learn both sender and recipient of any message. This can trivially be accomplished by foregoing a central server and doing peer-to-peer communication (note that FACTS may still be useful as a central complaint repository); or using more sophisticated cryptography to hide metadata [6], [10], [41].…”
Section: Alternative Factsmentioning
confidence: 99%
“…However, some existing EEMS attempt to also obscure this metadata in transmitting messages, so that the server does not learn both sender and recipient of any message. This can trivially be accomplished by foregoing a central server and doing peer-to-peer communication (note that FACTS may still be useful as a central complaint repository); or using more sophisticated cryptography to hide metadata [6], [10], [41].…”
Section: Alternative Factsmentioning
confidence: 99%
“…Moreover, in Vuvuzela, the adversary can distinguish whether a receiver is participating in a dialing or conversation protocol, whereas in AOT the adversary cannot make this distinction. Stadium [65] adds horizontal scalability and verifiable mixing to Vuvuzela. Deaddrops and AOT's message tags (See Section 4.1) are similar to the rendezvous hash value of the UDM protocol of Chaum et al [17].…”
Section: Anonymous Communication Networkmentioning
confidence: 99%
“…We compare design features and security and efficiency properties of AOT with those of selected other ACSs: original mixnet (OM) [12], cMix [16], Riffle [43], Stadium [65], Vuvuzela [66], and Loopix [55]. Table 1 summarizes the comparison.…”
Section: Comparison With Other Anonymity Systemsmentioning
confidence: 99%
See 1 more Smart Citation
“…There are by now millions of users using the Tor network [27,28] to break the link between their identities and their messages/packets. As the solutions like Tor network suffer from traffic analysis attacks [11,31,38], anonymous communication becomes an active research area and many works [1,3,29,42,43,47,52,53] aim at providing anonymous communication services efficiently. This work explores the solutions of anonymous communication with the help of secure multi-party computation (MPC).…”
Section: Introductionmentioning
confidence: 99%