International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Formal Notions of Anonymity for Peer-to-peer Networks

Authors:
Jiejun Kong
Download:
URL: http://eprint.iacr.org/2005/132
Search ePrint
Search Google
Abstract: Providing anonymity support for peer-to-peer (P2P) overlay networks is critical. Otherwise, potential privacy attacks (e.g., network address traceback) may deter a storage source from providing the needed data. In this paper we use this practical application scenario to verify our observation that network-based anonymity can be modeled as a complexity based cryptographic problem. We show that, if the routing process between senders and recipients can be modeled as abstract entities, network-based anonymity becomes an analogy of cryptography. In particular, perfect anonymity facing an unbounded traffic analyst corresponds to Shannon's perfect secrecy facing an unbounded cryptanalyst. More importantly, in this paper we propose Probabilistic Polynomial Route (PPR) model, which is a new polynomially-bounded anonymity model corresponding to the Probabilistic Polynomial Time (PPT) model in cryptography. Afterwards, network-based anonymity attacks are with no exception in BPP. This phenomenon has not been discovered in previous anonymity research.
BibTeX
@misc{eprint-2005-12468,
  title={Formal Notions of Anonymity for Peer-to-peer Networks},
  booktitle={IACR Eprint archive},
  keywords={foundations / anonymity},
  url={http://eprint.iacr.org/2005/132},
  note={UCLA Computer Science Technical Report CSD-TR050016 jkong@cs.ucla.edu 12906 received 3 May 2005},
  author={Jiejun Kong},
  year=2005
}