Enhancing of chaum mixes with random probabilistic functions

Slides:



Advertisements
Similar presentations
Self-Organized Anonymous Authentication in Mobile Ad Hoc Networks Julien Freudiger, Maxim Raya and Jean-Pierre Hubaux SECURECOMM, 2009.
Advertisements

NON-MALLEABLE EXTRACTORS AND SYMMETRIC KEY CRYPTOGRAPHY FROM WEAK SECRETS Yevgeniy Dodis and Daniel Wichs (NYU) STOC 2009.
The GraphSLAM Algorithm Daniel Holman CS 5391: AI Robotics March 12, 2014.
Message Splitting Against the Partial Adversary Andrei Serjantov The Free Haven Project (UK) Steven J Murdoch University of Cambridge Computer Laboratory.
1 Modeling and Analysis of Anonymous-Communication Systems Joan Feigenbaum WITS’08; Princeton NJ; June 18, 2008 Acknowledgement:
2003/04/23 Chapter 3 1頁1頁 3.6 Expected Value of Random Variables.
POPULATION- the entire group of individuals that we want information about SAMPLE- the part of the population that we actually examine in order to gather.
Preventing Active Timing Attacks in Low- Latency Anonymous Communication The 10 th Privacy Enhancing Technologies Symposium July 2010 Joan Feigenbaum Yale.
Active Learning for Probabilistic Models Lee Wee Sun Department of Computer Science National University of Singapore LARC-IMS Workshop.
Slicing the Onion: Anonymity Using Unreliable Overlays Sachin Katti Jeffrey Cohen & Dina Katabi.
Miscellaneous Terms. Math Notations Infix notation: Prefix notation: Postfix notation: Infix notation: 3*(6-4) Prefix notation: * -
Experimental design Course development NSS Monday 7 Nov.
Rounding Numbers Lesson 29.
R. Newman Anonymity - Background. Defining anonymity Defining anonymity Need for anonymity Need for anonymity Defining privacy Defining privacy Threats.
Simulation is the process of studying the behavior of a real system by using a model that replicates the behavior of the system under different scenarios.
STAT 3610/5610 – Time Series Analysis Topics to be covered Chapters 1 – 8 Chapter 9 – Skip Chapters 10 – 12.
An Analysis of Parallel Mixing with Attacker-Controlled Inputs Nikita Borisov formerly of UC Berkeley.
 Warm Up!! (Left side) What is the difference between an Equation and an Expression??
Sampling. Population vs. Sample Population – The entire group you want to study Sample – The portion of the population you select to study Parameter –
Mix networks with restricted routes PET 2003 Mix Networks with Restricted Routes George Danezis University of Cambridge Computer Laboratory Privacy Enhancing.
Effectiveness of Blending Attacks on Mixes Meng Tang.
Random Geometric Graph Model Model for ad hoc/sensor networks n nodes placed in d-dim space Connectivity threshold r Two nodes u,v connected iff ||u-v||
NSEL made good progress in recovery.
Parents Mathematics Workshop Strategies for Addition & Subtraction.
Math Facts Carla Shelton Grade 2 Sedalia Elementary.
Minutes Left:
Simulation Discrete Variables. What is it? A mathematical model Probabilistic Uses the entire range of possible values of a variable in the model.
Presented by Yu-Shun Wang Advisor: Frank, Yeong-Sung Lin Near Optimal Defense Strategies to Minimize Attackers’ Success Probabilities for networks of Honeypots.
Non-malleable Reductions and Applications Divesh Aggarwal * Yevgeniy Dodis * Tomasz Kazana ** Maciej Obremski ** Non-Malleable Codes from Two-Source Extractors.
RANDOM NUMBER GENERATORS MATH CLUB 12/06/2010. WHAT ARE RANDOM NUMBERS? 1, 3, 5, 7, 9, 11, …? 3, 7, 0, 7, 7, 4, 1, 5, 6, 1, 7, 8, 5 …? 44, 22, 16, 33,
DC-Networks – The Protocol. 2 DC-Networks - The Protocol toc Introduction Time Excluding bad clients Key Exchange Demonstration Some Attacks On-demand.
Lecture 16 I can’t hear you through the static OO.
Cryptography By: Nick Belhumeur. Overview What is Cryptography? What is Cryptography? 2 types of cryptosystems 2 types of cryptosystems Example of Encryption.
Debugging. Design Well A careful design limits the necessary debugging - think “top-down” Write comments as you go, especially invariants –You can test.
West, Ford & Ibrahim: Strategic Marketing
Rounding Numbers Lesson 1.9.
2nd Grade Campus Math Bee.
Topic 1: Strategic Marketing
I can’t hear you through the static
Jackson County ACT Aspire for Grade 10
4th Grade Math Bee Practice.
5th Grade Campus Math Bee
Goals of Statistics 8/27.
Anonymity Metrics R. Newman.
Towards Measuring Anonymity
When Security Games Go Green
What will you do with flash storage at disk economics?
NYU Cryptography Group
Anonymity in Structured Peer-to-Peer Networks
اختر أي شخصية واجعلها تطير!
Enhancing chaum mixes with randomness
Cost to defeat the N-1 Attack
Free-route Mixes vs. Cascades
Year 7 Mathematical Literacy Assessment
Saint Joseph Catholic High School
Introduction to Visual Analytics
Random WALK, BROWNIAN MOTION and SDEs
Simulation Discrete Variables.
4th Grade Campus Math Bee
5th Grade Math Bee Practice.
Identifying functions Ms. Schumacher
Modeling Entropy in Onion Routing Networks
Information Theoretical Analysis of Digital Watermarking
Using Number Sense to Solve One-Step Equations
Anonymity – Chaum Mixes
Teacher Name Teacher Name Teacher Name Teacher Name Teacher Name
Machine learning CS 229 / stats 229
Integer LP: Algorithms
Anonymity – Generalizing Mixes
REFLECTING ON FEEDBACK & PROGRESS
Presentation transcript:

Enhancing of chaum mixes with random probabilistic functions by Kanna

Overlook Random Generation (Yarrow/Fortuna vs standard rng functions like rand) Use random variable to determine the “path” the mix takes per round Use another random variable to determine the stats of the mix for said round Determine if dummy messages are in play and a random value to determine number of dummy messages popped. Mathematical analysis of the entire model. Cost vs Anonymity analysis

Current progress Determining random generator (Left for later) Designing the model for mix pathing (In progress) Mathematical analysis (After model and generator is determined) Strength against blending attacks/steady state attacks (After basic Math analysis) Looking into memory management (After Model is determined)

Resources How to Eat Your Entropy and Have it Too -- Optimal Recovery Strategies for Compromised RNGs Yevgeniy Dodis and Adi Shamir and Noah Stephens-Davidowitz and Daniel Wichs https://github.com/etam/fortuna Anonymity of Memory Limited Chaum Mixes under Timing Analysis: An Information Theoretic Perspective Mishra, A. and Venkitasubramaniam, P.