Definition of the Anonymity of Mix Network Runs Andrei Serjantov University of Cambridge Computer Laboratory.

Slides:



Advertisements
Similar presentations
A Probabilistic Analysis of Onion Routing in a Black-box Model 10/29/2007 Workshop on Privacy in the Electronic Society Aaron Johnson (Yale) with Joan.
Advertisements

A Formal Analysis of Onion Routing 10/26/2007 Aaron Johnson (Yale) with Joan Feigenbaum (Yale) Paul Syverson (NRL)
Causal Delivery (Thomas) Matt Guinn CS523, Spring 2006.
Timed Distributed System Models  A. Mok 2014 CS 386C.
1 EP2210 Fairness Lecture material: –Bertsekas, Gallager, Data networks, 6.5 –L. Massoulie, J. Roberts, "Bandwidth sharing: objectives and algorithms,“
1 Maximal Independent Set. 2 Independent Set (IS): In a graph G=(V,E), |V|=n, |E|=m, any set of nodes that are not adjacent.
Fast, Memory-Efficient Traffic Estimation by Coincidence Counting Fang Hao 1, Murali Kodialam 1, T. V. Lakshman 1, Hui Zhang 2, 1 Bell Labs, Lucent Technologies.
Computer Science 1 CSC 774 Advanced Network Security Enhancing Source-Location Privacy in Sensor Network Routing (ICDCS ’05) Brian Rogers Nov. 21, 2005.
Message Splitting Against the Partial Adversary Andrei Serjantov The Free Haven Project (UK) Steven J Murdoch University of Cambridge Computer Laboratory.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Ordering and Consistent Cuts Presented By Biswanath Panda.
1 Modeling and Analysis of Anonymous-Communication Systems Joan Feigenbaum WITS’08; Princeton NJ; June 18, 2008 Acknowledgement:
Chapter 6 Section 1 Introduction. Probability of an Event The probability of an event is a number that expresses the long run likelihood that an event.
Statistics & Modeling By Yan Gao. Terms of measured data Terms used in describing data –For example: “mean of a dataset” –An objectively measurable quantity.
A Look at Byzantine Generals Problem R J Walters.
I NTERNET A NONYMITY By Esra Erdin. Introduction Types of Anonymity Systems TOR Overview Working Mechanism of TOR I2P Overview Working Mechanism of I2P.
I.1 ii.2 iii.3 iv.4 1+1=. i.1 ii.2 iii.3 iv.4 1+1=
I.1 ii.2 iii.3 iv.4 1+1=. i.1 ii.2 iii.3 iv.4 1+1=
Impact of Different Mobility Models on Connectivity Probability of a Wireless Ad Hoc Network Tatiana K. Madsen, Frank H.P. Fitzek, Ramjee Prasad [tatiana.
Information Theory and Security
Multicast Communication Multicast is the delivery of a message to a group of receivers simultaneously in a single transmission from the source – The source.
On the Anonymity of Anonymity Systems Andrei Serjantov (anonymous)
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 17.
EM and expected complete log-likelihood Mixture of Experts
Modeling and Simulation CS 313
Entropy and the Second Law Lecture 2. Getting to know Entropy Imagine a box containing two different gases (for example, He and Ne) on either side of.
Data Publishing against Realistic Adversaries Johannes Gerhrke Cornell University Ithaca, NY Michaela Götz Cornell University Ithaca, NY Ashwin Machanavajjhala.
Mobile Traffic Sensor Network versus Motion-MIX: Tracing and Protecting Mobile Wireless Nodes JieJun Kong Dapeng Wu Xiaoyan Hong and Mario Gerla.
Channel Capacity.
Lecture 05: Theory of Automata:08 Kleene’s Theorem and NFA.
Gergely Tóth, 5 November Nordsec 2004, Helsinki, Finland, 4-5 November 2004 Measuring Anonymity Revisited Gergely Tóth Zoltán Hornák Ferenc Vajda.
Distributed Algorithms Lecture 10b – by Ali Ghodsi Fault-Tolerance in Asynchronous Networks – Probabilistic Consensus.
8.1.4 Can it still be factored? Factoring Completely I can factor out a common factor.
WOOD 492 MODELLING FOR DECISION SUPPORT Lecture 24 Simulation.
Energy-Efficient Monitoring of Extreme Values in Sensor Networks Loo, Kin Kong 10 May, 2007.
An Analysis of Parallel Mixing with Attacker-Controlled Inputs Nikita Borisov formerly of UC Berkeley.
11/18/2015 IENG 486 Statistical Quality & Process Control 1 IENG Lecture 07 Comparison of Location (Means)
Interconnect simulation. Different levels for Evaluating an architecture Numerical models – Mathematic formulations to obtain performance characteristics.
1 Leader Election in Rings. 2 A Ring Network Sense of direction left right.
Anonymity - Background R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide.
Introduction Network Quality Assurance (and Simulation!) Read Chapters 1, 2, 3.
Mix networks with restricted routes PET 2003 Mix Networks with Restricted Routes George Danezis University of Cambridge Computer Laboratory Privacy Enhancing.
THE SEVEN LAYERS OF THE OSI MODEL. PHYSICAL LAYER Encodes the packets into a signal recognized by the medium that will carry them Ex. Analog signal sent.
CSE 486/586 CSE 486/586 Distributed Systems Global States Steve Ko Computer Sciences and Engineering University at Buffalo.
Channel Coding Theorem (The most famous in IT) Channel Capacity; Problem: finding the maximum number of distinguishable signals for n uses of a communication.
6.2 Logical Clocks Kranthi Koya09/23/2015. Overview Introduction Lamport’s Logical Clocks Vector Clocks Research Areas Conclusion.
Game Theoretic Model of Censorship Resistance Andrei Serjantov University of Cambridge Computer Laboratory.
CSC2535 Lecture 5 Sigmoid Belief Nets
Chapter 9, Part E. VII. Calculating the Probability of Type II Errors A common decision in business is whether to accept a shipment or not, based upon.
ID NO : 1070 S. VARALAKSHMI Sethu Institute Of Tech IV year -ECE department CEC Batch : AUG 2012.
ENTROPY Entropy measures the uncertainty in a random experiment. Let X be a discrete random variable with range S X = { 1,2,3,... k} and pmf p k = P X.
1 Anonymity. 2 Overview  What is anonymity?  Why should anyone care about anonymity?  Relationship with security and in particular identification 
Systems Architecture Receiver Anonymity Matthias Füssel, Dennis Schneider June 5, 2007.
Anonymity Metrics R. Newman.
SocialMix: Supporting Privacy-aware Trusted Social Networking Services
A way to detect a collision…
Towards Measuring Anonymity
Topic 3: Perfect Secrecy
Error Correction Code (2)
Error Correction Code (2)
Free-route Mixes vs. Cascades
In-Class Exercises: Interpretations of Probability
Как да кандидатстваме по НИФ
Area of a rectangle Tuesday, 05 February 2019 Definition:
Error Correction Code (2)
Modeling Entropy in Onion Routing Networks
Anonymity – Generalizing Mixes
Contributors: Connor McCoy
U A B II III I IV 94.
Presentation transcript:

Definition of the Anonymity of Mix Network Runs Andrei Serjantov University of Cambridge Computer Laboratory

Metric in Mix Networks (PET 2002) Metric also useful in mix networks Q R D B {(A,0.125), (B,0.125), (C,0.25), (D,0.5)} A C

Route Length (Sets) (PET 2002) Q R D B {A,B,C,D} A C Now we look at how information can change APD, but not the underlying set Mix systems, often have a maximum route length (eg Mixmaster)

Route Length (probabilities) (PET 2002) Max route length = 2. A"1,3,2"Q cannot happen C"3,2" {Q or R}. S has the anonymity set {A,B} Q,R still have the anonymity set {A,B,C} but a different anonymity probability distribution (with a lower entropy) 12 3 A B C S R Q

Hence we need a principled way of calculating the anonymity of a message as seen by the attacker!

A Formal Model of a Mix Network Given a set of input messages, our model can tell us what the mix network will do → (a real trace of events which happen in the network) M2 M1 Sender2 Sender1 Sender3 R2 R1 R3 {(Sender1,[M1,M2],R1) (Sender2,[M1],R2) (Sender3,[M2],R3)}

Generating a Real Trace M2 M1 Sender 2 Sender 1 Sender3 R2 R1 R3 [(Sender 1,M 1,MixRecv,C 1),(Sender 2,M 1,MixRecv,C 2),(Mix 1,Recv (R 2),RecvRecv,C 2),(Mix 1,M 2,MixRecv,C 1),(Sender 3,M 2,MixRecv,C 3),(Mix 2,Recv (R 3),RecvRecv,C 3),(Mix 2,Recv (R 1),RecvRecv,C 1)] {(Sender1,[M1,M2],R1,C1) (Sender2,[M1],R2,C2) (Sender3,[M2],R3,C3)}

Erasing the Real Trace (1) From this, we can work out what the attacker will observe –(the real get erased to remove the information the attacker cannot see) –We get an erased trace M2 M1 Sender 2 Sender 1 Sender3 R2 R1 R3 M2 M1 Sender 2 Sender 1 Sender3 R2 R1 R3

Erasing the Real Trace (2) Real trace: [(Sender 1,M 1,MixRecv,C 1),(Sender 2,M 1,MixRecv,C 2),(Mix 1,Recv (R 2),RecvRecv,C 2),(Mix 1,M 2,MixRecv,C 1),(Sender 3,M 2,MixRecv,C 3),(Mix 2,Recv (R 3),RecvRecv,C 3),(Mix 2,Recv (R 1),RecvRecv,C 1)] Erased trace: [(Sender 1,M 1),(Sender 2,M 1),(Mix 1,Recv (R 2)), (Mix 1,M 2),(Sender 3,M 2),(Mix 2,Recv (R 3)),(Mix 2,Recv (R1))] M2 M1 Sender 2 Sender 1 Sender3 R2 R1 R3 M2 M1 Sender 2 Sender 1 Sender3 R2 R1 R3

From the Attacker’s Point of View The attacker has an observation (an erased trace Obs) He now uses the model to find all the real traces which erase to Obs → Call these All Obs = [(Sender 1,M 1),(Sender 2,M 1),(Mix 1,Recv (R 2)), (Mix 1,M 2),(Sender 3,M 2),(Mix 2,Recv (R 3)), (Mix 2,Recv (R1))] M2 M1 Sender 2 Sender 1 Sender3 R2 R1 R3

Finding All Scenarios M2 M1 Sender 2 Sender 1 Sender3 R2 R1 R3 M2 M1 Sender 2 Sender 1 Sender3 R2 R1 R3 M2 M1 Sender 2 Sender 1 Sender3 R2 R1 R3 M2 M1 Sender 2 Sender 1 Sender3 R2 R1 R3 I II III IV In 2 out of the 4 scenarios Sender 3 sent the message to R1

(In ASCII!) [[(Sender 1,M 1,MixRecv,C 1),(Sender 2,M 1,MixRecv,C 2),(Mix 1,Recv (R 2),RecvRecv,C 2),(Mix 1,M 2,MixRecv,C 1),(Sender 3,M 2,MixRecv,C 3),(Mix 2,Recv (R 3),RecvRecv,C 3),(Mix 2,Recv (R 1),RecvRecv,C 1)], [(Sender 1,M 1,MixRecv,C 1),(Sender 2,M 1,MixRecv,C 2),(Mix 1,Recv (R 2),RecvRecv,C 2),(Mix 1,M 2,MixRecv,C 1),(Sender 3,M 2,MixRecv,C 3),(Mix 2,Recv (R 3),RecvRecv,C 1),(Mix 2,Recv (R 1),RecvRecv,C 3)], [(Sender 1,M 1,MixRecv,C 1),(Sender 2,M 1,MixRecv,C 2),(Mix 1,Recv (R 2),RecvRecv,C 1),(Mix 1,M 2,MixRecv,C 2),(Sender 3,M 2,MixRecv,C 3),(Mix 2,Recv (R 3),RecvRecv,C 3),(Mix 2,Recv (R 1),RecvRecv,C 2)], [(Sender 1,M 1,MixRecv,C 1),(Sender 2,M 1,MixRecv,C 2),(Mix 1,Recv (R 2),RecvRecv,C 1),(Mix 1,M 2,MixRecv,C 2),(Sender 3,M 2,MixRecv,C 3),(Mix 2,Recv (R 3),RecvRecv,C 2),(Mix 2,Recv (R 1),RecvRecv,C 3)]]

Probabilities Suppose: –All senders equally likely to send to all receivers –All routes equally likely to be chosen →All scenarios are equiprobable For the message which arrives at R1, the anonymity probability distribution is: {(Sender 1,0.25), (Sender 2, 0.25), (Sender 3,0.5)} (Glossing over the exact details)

See my PhD Thesis for this and lots of other cool things…