[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[freehaven-cvs] rewrite a few things for space tweaks



Update of /home2/freehaven/cvsroot/doc/e2e-traffic
In directory moria.mit.edu:/tmp/cvs-serv25564

Modified Files:
	e2e-traffic.tex 
Log Message:
rewrite a few things for space tweaks


Index: e2e-traffic.tex
===================================================================
RCS file: /home2/freehaven/cvsroot/doc/e2e-traffic/e2e-traffic.tex,v
retrieving revision 1.46
retrieving revision 1.47
diff -u -d -r1.46 -r1.47
--- e2e-traffic.tex	2 May 2004 22:12:33 -0000	1.46
+++ e2e-traffic.tex	2 May 2004 22:23:49 -0000	1.47
@@ -224,9 +224,9 @@
 \cite{rao-pseudonymity}.
 
 \subsection{The long-term intersection attack}
-Even if all the above attacks are foiled, an adversary can
-mount a \emph{long-term intersection attack} by correlating the times at
-which senders and receivers are active \cite{disad-free-routes}.
+Even if we foil all the above attacks, an adversary can
+mount a \emph{long-term intersection attack} by correlating times
+when senders and receivers are active \cite{disad-free-routes}.
 
 A variety of countermeasures make intersection attacks harder.
 Kesdogan's stop-and-go mixes
@@ -411,7 +411,7 @@
 between senders and recipients.  Such improved algorithms include
 timed dynamic-pool mixes, generalized mixes, and randomized versions of
 each \cite{pet2003-diaz,trickle02}.  Rather than reordering and
-relaying all the messages whenever a fixed number $b$ have arrived,
+relaying all the messages whenever a fixed number $b$ arrive,
 these algorithms store received messages in a {\it pool}, and at fixed
 intervals relay a {\it fraction} of the pooled messages, based on the pool's
 current size.
@@ -475,7 +475,7 @@
 Alice, averaging them gives:
 \[\B{U'} \approx \frac{\delta_a}{\B{n}} \V{v} +
                    \frac{1-\delta_a}{\B{n}} \V{u} \]
-and the attacker can thus solve again for $\V{v}$ in the earlier equation for
+and the attacker can solve again for $\V{v}$ in the earlier equation for
 $\B{O_w}$, now using
 \[\V{u} \approx \frac{1}{1-\delta_a}
                \left[ \B{n} \cdot \B{U'} - \delta_a \cdot \V{v} \right] \]
@@ -511,10 +511,10 @@
 
 Although these methods can slow or stop the attacker (as
 discussed below in Section \ref{sec:simulation}), the change in the attack
-itself is trivial: Alice's behavior
+is trivial: Alice's behavior
 vector $\V{v}$ no longer adds to $1$, since there is now a chance that a
 message from Alice will not reach any recipient.  Aside from this, the
-attacker can proceed as before, so long as Alice sends more messages
+attack can proceed as before, so long as Alice sends more messages
 (including dummies) in some rounds than in others.
 
 %%\XXXX{Is the rest of this section even vaguely germane or realistic?}
@@ -927,8 +927,8 @@
 \hfill
 \end{figure}
 
-In our second padding strategy
-(``imperfect threshold padding''), we assume that Alice attempts to implement
+Our second padding strategy
+(``imperfect threshold padding'') assumes that Alice attempts to implement
 the otherwise unbreakable threshold padding strategy (always send $M$
 messages total
 in every round, adding dummies up to $M$ and delaying messages after $M$ as

***********************************************************************
To unsubscribe, send an e-mail to majordomo@seul.org with
unsubscribe freehaven-cvs       in the body. http://freehaven.net/