[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[freehaven-cvs] abstract / first section of minion-systems short paper



Update of /home/freehaven/cvsroot/doc/fc04
In directory moria.mit.edu:/home2/arma/work/freehaven/doc/fc04

Added Files:
	llncs.cls minion-systems.bib minion-systems.tex 
Log Message:
abstract / first section of minion-systems short paper


--- NEW FILE: llncs.cls ---
% LLNCS DOCUMENT CLASS -- version 2.8
% for LaTeX2e
%
\NeedsTeXFormat{LaTeX2e}[1995/12/01]
\ProvidesClass{llncs}[2000/05/16 v2.8
^^JLaTeX document class for Lecture Notes in Computer Science]
% Options
\let\if@envcntreset\iffalse
\DeclareOption{envcountreset}{\let\if@envcntreset\iftrue}
\DeclareOption{citeauthoryear}{\let\citeauthoryear=Y}
\DeclareOption{oribibl}{\let\oribibl=Y}
\let\if@custvec\iftrue
\DeclareOption{orivec}{\let\if@custvec\iffalse}
\let\if@envcntsame\iffalse
\DeclareOption{envcountsame}{\let\if@envcntsame\iftrue}
\let\if@envcntsect\iffalse
\DeclareOption{envcountsect}{\let\if@envcntsect\iftrue}
\let\if@runhead\iffalse
\DeclareOption{runningheads}{\let\if@runhead\iftrue}
[...976 lines suppressed...]
   \def\sectionmark##1{}%
   \def\subsectionmark##1{}}

\def\ps@titlepage{\let\@mkboth\@gobbletwo
   \let\@oddfoot\@empty\let\@evenfoot\@empty
   \def\@evenhead{\normalfont\small\rlap{\thepage}\hspace{\headlineindent}%
                  \hfil}
   \def\@oddhead{\normalfont\small\hfil\hspace{\headlineindent}%
                 \llap{\thepage}}
   \def\chaptermark##1{}%
   \def\sectionmark##1{}%
   \def\subsectionmark##1{}}

\if@runhead\ps@headings\else
\ps@empty\fi

\setlength\arraycolsep{1.4\p@}
\setlength\tabcolsep{1.4\p@}

\endinput

--- NEW FILE: minion-systems.bib ---
@inproceedings{ rao-pseudonymity,
    author = "Josyula R. Rao and Pankaj Rohatgi",
    title = "Can Pseudonymity Really Guarantee Privacy?",
    booktitle = "Proceedings of the Ninth USENIX Security Symposium",
    year = {2000},
    month = Aug,
    publisher = {USENIX},
    pages = "85--96",
    note = {\url{http://www.usenix.org/publications/library/proceedings/sec2000/
full_papers/rao/rao.pdf}},
}

@InProceedings{pfitzmann90how,
    author = "Birgit Pfitzmann and Andreas Pfitzmann",
    title = "How to Break the Direct {RSA}-Implementation of {MIXes}",
    booktitle = {Eurocrypt 89},
    publisher = {Springer-Verlag, LNCS 434},
    year = {1990},
    note = {\url{http://citeseer.nj.nec.com/pfitzmann90how.html}},
}

@Misc{mixminion-spec,
   author =      {Mixminion},
   title =       {Type {III} ({M}ixminion) Mix Protocol Specifications},
   note =        {\newline \url{http://mixminion.net/minion-spec.txt}},
}

@InProceedings{BM:mixencrypt,
  author =       {M{\"o}ller, Bodo},
  title =        {Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes},
  booktitle =    {{CT-RSA} 2003},
  publisher =    {Springer-Verlag, LNCS 2612},
  year =         2003,
}

% Would a more recent reference for SPRPs be more useful?
@Article{sprp,
   author =      {Michael Luby and Charles Rackoff},
   title =       {How to Construct Pseudorandom Permutations from
                  Pseudorandom Functions},
   journal =     {SIAM Journal on Computing},
   year =        {1988},
   volume =      {17},
   number =      {2},
   pages =       {373--386},
}

@InProceedings{back01,
  author =       {Adam Back and Ulf M\"oller and Anton Stiglic},
  title =        {Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems},
  booktitle =    {Information Hiding (IH 2001)},
  pages =        {245--257},
  year =         2001,
  editor =       {Ira S. Moskowitz},
  publisher =    {Springer-Verlag, LNCS 2137},
  note =         {\newline \url{http://www.cypherspace.org/adam/pubs/traffic.pdf}},
}

@InProceedings{rackoff93cryptographic,
   author =      {Charles Rackoff and Daniel R. Simon},
   title =       {Cryptographic Defense Against Traffic Analysis},
   booktitle =   {{ACM} Symposium on Theory of Computing},
   pages =       {672--681},
   year =        {1993},
   note =        {\url{http://research.microsoft.com/crypto/dansimon/me.htm}},
}

@InProceedings{freehaven-berk,
   author =      {Roger Dingledine and Michael J. Freedman and David Molnar},
   title =       {The Free Haven Project: Distributed Anonymous Storage Service},
   booktitle =   {Designing Privacy Enhancing Technologies: Workshop
                  on Design Issue in Anonymity and Unobservability},
   year =        {2000},
   month =       {July},
   editor =      {H. Federrath},
   publisher =   {Springer-Verlag, LNCS 2009},
   note =        {\url{http://freehaven.net/papers.html}},
}

@InProceedings{raymond00,
  author =       {J. F. Raymond},
  title =        {{Traffic Analysis: Protocols, Attacks, Design Issues,
                  and Open Problems}}, 
  booktitle =    {Designing Privacy Enhancing Technologies: Workshop
                  on Design Issue in Anonymity and Unobservability},  
  year =         2000,
  month =        {July},
  pages =        {10-29},
  editor =       {H. Federrath},
  publisher =    {Springer-Verlag, LNCS 2009},
}

@InProceedings{trickle02,
  author =       {Andrei Serjantov and Roger Dingledine and Paul Syverson},
  title =        {From a Trickle to a Flood: Active Attacks on Several
                  Mix Types},
  booktitle =    {Information Hiding (IH 2002)},
  year =         {2002},
  editor =       {Fabien Petitcolas},
  publisher =    {Springer-Verlag, LNCS (forthcoming)},
}

@InProceedings{langos02,
  author =      {Oliver Berthold and Heinrich Langos},
  title =       {Dummy Traffic Against Long Term Intersection Attacks},
  booktitle =    {Privacy Enhancing Technologies (PET 2002)},
  year =         {2002},
  editor =       {Roger Dingledine and Paul Syverson},
  publisher =    {Springer-Verlag, LNCS 2482}
}

@InProceedings{onion-discex00,
   author =      {Paul Syverson and Michael Reed and David Goldschlag},
   title =       {{O}nion {R}outing Access Configurations},
   booktitle =   {DARPA Information Survivability Conference and
                  Exposition (DISCEX 2000)}, 
   year =        {2000},
   publisher =   {IEEE CS Press},
   pages =       {34--40},
   volume =      {1},
   note =        {\newline \url{http://www.onion-router.net/Publications.html}},
}

@Misc{TLS,
   author =      {T. Dierks and C. Allen},
   title =       {The {TLS} {P}rotocol --- {V}ersion 1.0},
   howpublished = {IETF RFC 2246},
   month =       {January},
   year =        {1999},
   note =        {\url{http://www.rfc-editor.org/rfc/rfc2246.txt}},
}

@Misc{SMTP,
   author =      {J. Postel},
   title =       {Simple {M}ail {T}ransfer {P}rotocol},
   howpublished = {IETF RFC 2821 (also STD0010)},
   month =       {April},
   year =        {2001},
   note =        {\url{http://www.rfc-editor.org/rfc/rfc2821.txt}},
}

@Misc{IMAP,
   author =      {M. Crispin},
   title =       {Internet {M}essage {A}ccess {P}rotocol --- {V}ersion 4rev1},
   howpublished = {IETF RFC 2060},
   month =       {December},
   year =        {1996},
   note =        {\url{http://www.rfc-editor.org/rfc/rfc2060.txt}},
}

@Misc{POP3,
   author =      {J. Myers and M. Rose},
   title =       {Post {O}ffice {P}rotocol --- {V}ersion 3},
   howpublished = {IETF RFC 1939 (also STD0053)},
   month =       {May},
   year =        {1996},
   note =        {\url{http://www.rfc-editor.org/rfc/rfc1939.txt}},
}

@InProceedings{syverson_2000,
  author =       {Paul F. Syverson and Gene Tsudik and Michael G. Reed
                  and Carl E. Landwehr},
  title =        {Towards an Analysis of Onion Routing Security},
  booktitle =    {Designing Privacy Enhancing Technologies: Workshop
                  on Design Issue in Anonymity and Unobservability},
  year =         2000,
  month =        {July},
  pages =        {96--114},
  editor =       {H. Federrath},
  publisher =    {Springer-Verlag, LNCS 2009},
  note =         {\newline \url{http://citeseer.nj.nec.com/syverson00towards.html}}
}

@InProceedings{shuffle,
   author =      {C. Andrew Neff},
   title =       {A Verifiable Secret Shuffle and its Application to E-Voting},
   booktitle =    {8th ACM Conference on Computer and Communications
                  Security (CCS-8)},
   pages =       {116--125},
   year =        2001,
   editor =      {P. Samarati},
   month =       {November},
   publisher =   {ACM Press},
   note =        {\url{http://www.votehere.net/ada_compliant/ourtechnology/
                       technicaldocs/shuffle.pdf}},
}

@InProceedings{dolev91,
   author =      {Danny Dolev and Cynthia Dwork and Moni Naor},
   title =       {Non-Malleable Cryptography},
   booktitle =   {23rd ACM Symposium on the Theory of Computing (STOC)},
   pages =       {542--552},
   year =        1991,
   note =        {Updated version at
                  \url{http://citeseer.nj.nec.com/dolev00nonmalleable.html}},
}

@TechReport{rsw96,
   author =      {Ronald L. Rivest and Adi Shamir and David A. Wagner},
   title =       {Time-lock puzzles and timed-release Crypto},
   year =        1996,
   type =        {MIT LCS technical memo},
   number =      {MIT/LCS/TR-684},
   month =       {February},
   note =        {\newline \url{http://citeseer.nj.nec.com/rivest96timelock.html}},
}

@InProceedings{web-mix,
   author =      {Oliver Berthold and Hannes Federrath and Stefan K\"opsell},
   title =       {Web {MIX}es: A system for anonymous and unobservable
                  {I}nternet access}, 
  booktitle =    {Designing Privacy Enhancing Technologies: Workshop
                  on Design Issue in Anonymity and Unobservability},
   editor =       {H. Federrath},
   publisher =    {Springer-Verlag, LNCS 2009},
   pages =       {115--129},
   year =        2000,
}

@InProceedings{disad-free-routes,
   author =      {Oliver Berthold and Andreas Pfitzmann and Ronny Standtke},
   title =       {The disadvantages of free {MIX} routes and how to overcome
                  them}, 
   booktitle =   {Designing Privacy Enhancing Technologies: Workshop
                  on Design Issue in Anonymity and Unobservability},
   pages =       {30--45},
   year =        2000,
   editor =       {H. Federrath},
   publisher =    {Springer-Verlag, LNCS 2009},
   note =        {\url{http://www.tik.ee.ethz.ch/~weiler/lehre/netsec/Unterlagen/anon/
                       disadvantages_berthold.pdf}},
}

@InProceedings{boneh00,
   author =      {Dan Boneh and Moni Naor},
   title =       {Timed Commitments},
   booktitle =   {Advances in Cryptology -- {CRYPTO} 2000},
   pages =       {236--254},
   year =        2000,
   publisher =   {Springer-Verlag, LNCS 1880},
   note =        {\newline \url{http://crypto.stanford.edu/~dabo/abstracts/timedcommit.html}},
}

@InProceedings{goldschlag98,
   author =      {David M. Goldschlag and Stuart G. Stubblebine},
   title =       {Publicly Verifiable Lotteries: Applications of
                  Delaying Functions},
   booktitle =   {Financial Cryptography, FC'98},
   pages =       {214--226},
   year =        1998,
   publisher =   {Springer-Verlag, LNCS 1465},
   note =        {\newline \url{http://citeseer.nj.nec.com/goldschlag98publicly.html}},
}

@InProceedings{syverson98,
   author =      {Paul Syverson},
   title =       {Weakly Secret Bit Commitment: Applications to
                  Lotteries and Fair Exchange},
   booktitle =   {Computer Security Foundations Workshop (CSFW11)},
   pages =       {2--13},
   year =        1998,
   address =     {Rockport Massachusetts},
   month =       {June},
   publisher =   {IEEE CS Press},
   note =        {\newline \url{http://chacs.nrl.navy.mil/publications/CHACS/1998/}},
}

@Misc{shoup-iso,
   author =      {Victor Shoup},
   title =       {A Proposal for an {ISO} {S}tandard for Public Key Encryption (version 2.1)},
   note =        {Revised December 20, 2001. \url{http://www.shoup.net/papers/}},
}

@Misc{shoup-oaep,
   author =      {Victor Shoup},
   title =       {{OAEP} Reconsidered},
   howpublished = {{IACR} e-print 2000/060},
   note =        {\newline \url{http://eprint.iacr.org/2000/060/}},
}

@Misc{oaep-still-alive,
   author =      {E. Fujisaki and D. Pointcheval and T. Okamoto and J. Stern},
   title =       {{RSA}-{OAEP} is Still Alive!},
   howpublished = {{IACR} e-print 2000/061},
   note =        {\newline \url{http://eprint.iacr.org/2000/061/}},
}

@misc{echolot,
  author = {Peter Palfrader},
  title = {Echolot: a pinger for anonymous remailers},
  note = {\url{http://www.palfrader.org/echolot/}},
}

@Misc{mixmaster-attacks,
   author =      {Lance Cottrell},
   title =       {Mixmaster and Remailer Attacks},
   note =        {\url{http://www.obscura.com/~loki/remailer/remailer-essay.html}},
}

@Misc{mixmaster-spec,
   author =      {Ulf M\"oller and Lance Cottrell},
   title =       {Mixmaster {P}rotocol --- {V}ersion 2},
   howpublished = {Unfinished draft, January 2000.},
   note =        {\url{http://www.eskimo.com/~rowdenw/crypt/Mix/
                       draft-moeller-mixmaster2-protocol-00.txt}},
}

@Article{mitzenm-loss,
   author =      {G. Louth and M. Mitzenmacher and F.P. Kelly},
   title =       {Computational Complexity of Loss Networks},
   journal =     {Theoretical Computer Science},
   year =        {1994},
   volume =      {125},
   pages =       {45-59},
   note =        {\newline \url{http://citeseer.nj.nec.com/louth94computational.html}},
}

@Misc{hashcash,
   author =      {Adam Back},
   title =       {Hash cash},
   note =        {\newline \url{http://www.cypherspace.org/~adam/hashcash/}},
}

@InProceedings{oreilly-acc,
   author =      {Roger Dingledine and Michael J. Freedman and David Molnar},
   title =       {Accountability},
   booktitle =   {Peer-to-peer: Harnessing the Benefits of a Disruptive 
                  Technology},
   year =        {2001},
   publisher =   {O'Reilly and Associates},
}

@InProceedings{han,
   author =      {Yongfei Han},
   title =       {Investigation of non-repudiation protocols},
   booktitle =   {ACISP '96},
   year =        {1996},
   publisher =   {Springer-Verlag},
}

@InProceedings{abe,
   author =      {Masayuki Abe},
   title =       {Universally Verifiable {MIX} With Verification Work Independent of
                  The Number of {MIX} Servers},
   booktitle =   {{EUROCRYPT} 1998},
   year =        {1998},
   publisher =   {Springer-Verlag, LNCS 1403},
}

@InProceedings{desmedt,
   author =      {Yvo Desmedt and Kaoru Kurosawa},
   title =       {How To Break a Practical {MIX} and Design a New One},
   booktitle =   {{EUROCRYPT} 2000},
   year =        {2000},
   publisher =   {Springer-Verlag, LNCS 1803},
   note =        {\url{http://citeseer.nj.nec.com/447709.html}},
}

@InProceedings{mitkuro,
   author =      {M. Mitomo and K. Kurosawa},
   title =       {{Attack for Flash MIX}},
   booktitle =   {{ASIACRYPT} 2000},
   year =        {2000},
   publisher =   {Springer-Verlag, LNCS 1976},
   note =        {\newline \url{http://citeseer.nj.nec.com/450148.html}},
}

@InProceedings{hybrid-mix,
   author =      {M. Ohkubo and M. Abe},
   title =       {A {L}ength-{I}nvariant {H}ybrid {MIX}},
   booktitle =   {Advances in Cryptology - {ASIACRYPT} 2000},
   year =        {2000},
   publisher =   {Springer-Verlag, LNCS 1976},
}

@InProceedings{PShuffle,
  author = {Jun Furukawa and Kazue Sako},
  title = {An Efficient Scheme for Proving a Shuffle},
  editor    = {Joe Kilian},
  booktitle = {CRYPTO 2001},
  year      = {2001},
  publisher = {Springer-Verlag, LNCS 2139},
}


@InProceedings{jakobsson-optimally,
  author = "Markus Jakobsson and Ari Juels",
  title = "An Optimally Robust Hybrid Mix Network (Extended Abstract)",
  booktitle =   {Principles of Distributed Computing - {PODC} '01},
  year = "2001",
  publisher =   {ACM Press},
  note = {\url{http://citeseer.nj.nec.com/492015.html}},
}

@InProceedings{kesdogan,
   author =      {D. Kesdogan and M. Egner and T. B\"uschkes},
   title =       {Stop-and-Go {MIX}es Providing Probabilistic Anonymity in an Open 
                  System},
   booktitle =   {Information Hiding (IH 1998)},
   year =        {1998},
   publisher =   {Springer-Verlag, LNCS 1525},
   note =        {\url{http://www.cl.cam.ac.uk/~fapp2/ihw98/ihw98-sgmix.pdf}},
}

@InProceedings{flash-mix,
   author =      {Markus Jakobsson},
   title =       {Flash {M}ixing},
   booktitle =   {Principles of Distributed Computing - {PODC} '99},
   year =        {1999},
   publisher =   {ACM Press},
   note =        {\newline \url{http://citeseer.nj.nec.com/jakobsson99flash.html}},
}

@InProceedings{SK,
   author =      {Joe Kilian and Kazue Sako},
   title =       {Receipt-Free {MIX}-Type Voting Scheme - A Practical Solution to
                  the Implementation of a Voting Booth},
   booktitle =   {EUROCRYPT '95},
   year =        {1995},
   publisher =   {Springer-Verlag},
}

@InProceedings{OAEP,
   author =      {M. Bellare and P. Rogaway},
   year =        {1994},
   booktitle =   {EUROCRYPT '94},
   title =       {Optimal {A}symmetric {E}ncryption {P}adding : How To Encrypt With
                  {RSA}},
   publisher =   {Springer-Verlag},
   note =        {\newline \url{http://www-cse.ucsd.edu/users/mihir/papers/oaep.html}},
}

@InProceedings{babel,
   author =      {C. Gulcu and G. Tsudik},
   title =       {Mixing {E}-mail With {B}abel},
   booktitle =   {Network and Distributed Security Symposium - {NDSS} '96},
   year =        {1996},
   publisher =   {IEEE},
   note =        {\newline \url{http://citeseer.nj.nec.com/2254.html}}
}

@InProceedings{freenet,
   author =      {Ian Clarke and Oskar Sandberg and Brandon Wiley and Theodore W. Hong},
   title =       {Freenet: {A} Distributed Anonymous Information Storage and Retrieval 
                  System},
   booktitle =   {Workshop on Design Issues in Anonymity and Unobservability},
   pages =       {46--66},
   year =        {2000},
   note =        {\newline \url{http://citeseer.nj.nec.com/clarke00freenet.html}},
}

@Misc{rprocess,
   author =      {RProcess},
   title =       {Selective Denial of Service Attacks},
   note =        {\newline \url{http://www.eff.org/pub/Privacy/Anonymity/1999\_09\_DoS\_remail\_vuln.html}},
}

@Article{remailer-history,
  author = {Sameer Parekh},
  title = {Prospects for Remailers},
  journal = {First Monday},
  volume = {1},
  number = {2},
  month = {August},
  year = {1996},
  note = {\url{http://www.firstmonday.dk/issues/issue2/remailers/}},
}

@Misc{remailer-history-old,
   author =      {Tim May},
   title =       {Description of early remailer history},
   howpublished = {E-mail archived at
                  \url{http://www.inet-one.com/cypherpunks/dir.1996.08.29-1996.09.04/
                       msg00431.html}},
}

@Article{chaum-mix,
   author =      {David Chaum},
   title =       {Untraceable electronic mail, return addresses, and digital pseudo-nyms},
   journal =     {Communications of the ACM},
   year =        {1982},
   volume =      {4},
   number =      {2},
   month =       {February},
   note =        {\url{http://www.eskimo.com/~weidai/mix-net.txt}},
}

@InProceedings{nym-alias-net,
  author =       {David Mazi\`{e}res and M. Frans Kaashoek}, 
  title =        {{The Design, Implementation and Operation of an Email
                  Pseudonym Server}},
  booktitle =    {$5^{th}$ ACM Conference on Computer and
                  Communications Security (CCS'98)},
  year =         1998,
  publisher =    {ACM Press},
  note =        {\newline \url{http://www.scs.cs.nyu.edu/~dm/}},
}

@Misc{timmay,
   author =      {Tim May},
   title =       {Cyphernomicon},
   note =        {\newline \url{http://www2.pro-ns.net/~crypto/cyphernomicon.html}},
}

@misc{neochaum,
   author =      {Tim May},
   title =       {Payment mixes for anonymity}, 
   howpublished = {E-mail archived at
                  \url{http://\newline www.inet-one.com/cypherpunks/dir.2000.02.28-2000.03.05/msg00334.html}},
}

@misc{pidaho,
   author =      {Joel McNamara},
   title =       {{P}rivate {I}daho},
   note =        {\newline \url{http://www.eskimo.com/~joelm/pi.html}},
}

@misc{potato,
   author =      {RProcess},
   title =       {{P}otato {S}oftware}, 
   note =        {\newline \url{http://www.skuz.net/potatoware/}},
}

@misc{helsingius, 
   author =      {J. Helsingius},
   title =       {{\tt anon.penet.fi} press release}, 
   note =        {\newline \url{http://www.penet.fi/press-english.html}},
}

@misc{mix-stats,
   author =      {Christian Mock},
   title =       {Mixmaster Stats ({A}ustria)}, 
   note =        {\newline \url{http://www.tahina.priv.at/~cm/stats/mlist2.html}},
}

@InProceedings{garay97secure,
   author =      {J. Garay and R. Gennaro and C. Jutla and T. Rabin},
   title =       {Secure distributed storage and retrieval},
   booktitle =   {11th International Workshop, WDAG '97},
   pages =       {275--289},
   year =        {1997},
   publisher =   {Springer-Verlag, LNCS 1320},
   note =        {\newline \url{http://citeseer.nj.nec.com/garay97secure.html}},
}

@InProceedings{PIK,
   author =      {C. Park and K. Itoh and K. Kurosawa},
   title =       {Efficient anonymous channel and all/nothing election scheme},
   booktitle =   {Advances in Cryptology -- {EUROCRYPT} '93},
   pages =       {248--259},
   publisher =   {Springer-Verlag, LNCS 765},
}

@Misc{pgpfaq,
   key =         {PGP},
   title =       {{PGP} {FAQ}},
   note =        {\newline \url{http://www.faqs.org/faqs/pgp-faq/}},
}

@Article{riordan-schneier,
   author =      {James Riordan and Bruce Schneier},
   title =       {A Certified E-mail Protocol with No Trusted Third Party},
   journal =     {13th Annual Computer Security Applications Conference},
   month =       {December},
   year =        {1998},
   note =        {\newline \url{http://www.counterpane.com/certified-email.html}},
}

@Article{crowds,
   author =      {Michael K. Reiter and Aviel D. Rubin},
   title =       {Crowds: Anonymity for Web Transactions},
   journal =     {{DIMACS} Technical Report},
   volume =      {97},
   number =      {15},
   month =       {April},
   year =        {1997},
   note =        {\newline \url{http://citeseer.nj.nec.com/284739.html}},
}

@Misc{freedom,
   author =      {Zero Knowledge Systems}, 
   title =       {Freedom Version 2 White Papers},
   note =        {\newline \url{http://www.freedom.net/info/whitepapers/}},
}


@Misc{recovery,
   author =      {Miguel Castro and Barbara Liskov}, 
   title =       {Proactive Recovery in a Byzantine-Fault-Tolerant System},
   note =        {\newline \url{http://www.pmg.lcs.mit.edu/~castro/application/recovery.pdf}},
}

@Misc{advogato,
   author =      {Raph Levien}, 
   title =       {Advogato's Trust Metric},
   note =        {\newline \url{http://www.advogato.org/trust-metric.html}},
}

@Misc{rabin-ida,
   author =      {Michael O. Rabin},
   title =       {Efficient Dispersal of Information for security, load balancing,
                  and fault tolerance},
   booktitle =   {Journal of the ACM},
   year =        {1989},
   volume =      {36},
   number =      {2},
   series =      {335--348},
   month =       {April},
}

@PhdThesis{malkin-thesis,
   author =      {Tal Malkin},
   school =      {{MIT}},
   title =       {Private {I}nformation {R}etrieval},
   year =        {2000},
   note =        {\newline \url{http://toc.lcs.mit.edu/~tal/pubs.html}}
}

@Misc{zks,
   title =       {Zero {K}nowledge {S}ystems},
   note =        {\newline \url{http://www.freedom.net/}},
}  

@InProceedings{publius,
   author =      {Marc Waldman and Aviel Rubin and Lorrie Cranor}, 
   title =       {Publius: {A} robust, tamper-evident, censorship-resistant and
                  source-anonymous web publishing system},
   booktitle =   {Proc. 9th USENIX Security Symposium},
   pages =       {59--72},
   year =        {2000},
   month =       {August},
   note =        {\newline \url{http://citeseer.nj.nec.com/waldman00publius.html}},
}

@Misc{freedom-nyms,
   author =      {Russell Samuels},
   title =       {Untraceable Nym Creation on the {F}reedom {N}etwork},
   year =        {1999},
   month =       {November},
   day =         {21},
   note =        {\newline \url{http://www.freedom.net/products/whitepapers/white11.html}},
}

@Article{raghavan87randomized,
   author =      {P. Raghavan and C. Thompson},
   title =       {Randomized rounding: A technique for provably good algorithms and algorithmic proofs},
   journal =     {Combinatorica},
   volume =      {7},
   pages =       {365--374},
   year =        {1987},
}

@InProceedings{leighton91fast,
   author =      {Frank Thomson Leighton and Fillia Makedon and Serge A. Plotkin and
                  Clifford Stein and Eva Tardos and Spyros Tragoudas},
   title =       {Fast Approximation Algorithms for Multicommodity Flow Problems},
   booktitle =   {{ACM} Symposium on Theory of Computing},
   pages =       {101-111},
   year =        {1991},
   note =        {\newline \url{http://citeseer.nj.nec.com/91073.html}},
}

@Misc{pk-relations,
   author =      {M. Bellare and A. Desai and D. Pointcheval and P. Rogaway},
   title =       {Relations Among Notions of Security for Public-Key Encryption
                  Schemes},
   howpublished = {
                  Extended abstract in {\em Advances in Cryptology - CRYPTO '98}, LNCS Vol. 1462.
                  Springer-Verlag, 1998.
                  Full version available from \newline \url{http://www-cse.ucsd.edu/users/mihir/}},
}


@InProceedings{mix-acc, 
  author =      {Roger Dingledine and Michael J. Freedman and David
                  Hopwood and David Molnar},
  title =       {{A Reputation System to Increase MIX-net
                  Reliability}},
  booktitle =   {Information Hiding (IH 2001)},
  pages =       {126--141},
  year =        2001,
  editor =      {Ira S. Moskowitz},
  publisher =   {Springer-Verlag, LNCS 2137},
  note =        {\url{http://www.freehaven.net/papers.html}},
}

@InProceedings{casc-rep,
   author =      {Roger Dingledine and Paul Syverson},
   title =       {{Reliable MIX Cascade Networks through Reputation}},
  booktitle =    {Financial Cryptography (FC '02)},
  year =         2002,
  editor =       {Matt Blaze},
  publisher =    {Springer-Verlag, LNCS (forthcoming)},
  note =        {\newline \url{http://www.freehaven.net/papers.html}},
}

@InProceedings{zhou96certified,
   author =      {Zhou and Gollmann},
   title =       {Certified Electronic Mail},
   booktitle =   {{ESORICS: European Symposium on Research in Computer
                  Security}},
   publisher =   {Springer-Verlag, LNCS 1146},
   year =        {1996},
   note =        {\newline \url{http://citeseer.nj.nec.com/zhou96certified.html}},
}

@Misc{realtime-mix,
   author =      {Anja Jerichow and Jan M\"uller and Andreas Pfitzmann and
                  Birgit Pfitzmann and Michael Waidner}, 
   title =       {{Real-Time MIXes: A Bandwidth-Efficient Anonymity Protocol}},
   howpublished = {IEEE Journal on Selected Areas in Communications, 1998.},
   note =        {\url{http://www.zurich.ibm.com/security/publications/1998.html}},
}

@InProceedings{BEAR-LIONESS,
    author =     {Ross Anderson and Eli Biham},
    title =      {Two Practical and Provably Secure Block Ciphers: {BEAR} and {LION}},
    booktitle =  {International Workshop on Fast Software Encryption},
    year =       {1996},
    publisher =  {Springer-Verlag},
    note =       {\url{http://citeseer.nj.nec.com/anderson96two.html}},
}

@Misc{SPC,
    author =     {Daniel Bleichenbacher and Anand Desai},
    title =      {A Construction of a Super-Pseudorandom Cipher},
    howpublished = {Manuscript},
}


--- NEW FILE: minion-systems.tex ---

\documentclass{llncs}
\usepackage{epsfig}
\usepackage{graphicx}
\usepackage{amsmath}

\begin{document}

\title{foo}
\author{Nick Mathewson and Roger Dingledine}
\institute{The Free Haven Project
\email{\{nickm,arma\}@freehaven.net}}

\maketitle

\begin{abstract}

Anonymous communication is a valuable but underused tool for the
security of financial communications.  Even as early as the first
commercial telegraph codes, businesses have recognized the value of
using cryptography to conceal the contents of their communication from
prying eyes.  But even when communications are encrypted, adversaries
can still learn of confidential business relationships by performing
traffic analysis to discover the {\it presence} of communication.

Mixminion is an open-source, deployed research system that provides
strong resistance against known forms of traffic analysis, and allows
users to communicate without their identities being discovered.

\end{abstract}

%Keywords: anonymity, economics, incentives, decentralized, reputation

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

\section{Introduction: Anonymity and Finance}
In this paper, we argue for the value to the finance community of
strong anonymous communications to resist traffic analysis.

Soon after the first business-related telegram was sent to an
untrusted telegraph operator, businesses have recognized the
importance of encrypting communication.  Less well-recognized,
however, is the importance of protecting business communications
against traffic analysis.

Whenever data travels over public networks, an eavesdropper can
usually determine with little difficulty the sender and recipient of
that data.  Although this information might initially seem of little
interest, there are many circumstances under which learning the volume
of communication between a pair of sites can reveal confidential
information.  For example, traffic analysis can reveal:
\begin{itemize}
\item Whether (and how often) the CEO of a Fortune 500 corporation has
been exchanging email with the CEO of a rumored buyout partner.
\item Which suppliers' websites a given purchaser is visiting.
\item Which prospective customers a vendor has emailed, and which of
  them responded via email.
\end{itemize}
When an organization is geographically distributed, its internal
communications can become a target of traffic analysis.  In this way,
an eavesdropper may learn:
\begin{itemize}
\item Which locations are working late.
\item Which locations are consulting job-hunting websites.
\item Which research groups are communicating with a company's patent
  lawyers.
\item What volume of communication an R\&D group is exchanging with a
  production line.
\end{itemize}
While firewalls or VPNs can conceal a network's interior view,
they do not provide any further privacy against traffic analysis
attacks.

These attacks are certainly feasible today.  On the simplest level,
corporate website administrators routinely survey logs to learn which
competitors and customers have viewed which parts of their websites,
and how often.  The more sophisticated attcaks are almost certainly
within capabilities of the NSA-supported ECHELON eavesdropping system
(which has been probably used to advance the commercial interests of
its sponsor nations) [XXXX must confirm this], or the capabilities of
many COMINT-sophisticated nation inclined to use its resources for
economic goals.

In this paper, we discuss several existing systems and designs to
defeat traffic analysis.  We focus on Mixminion, an open-source
application with a deployed research network.




\bibliographystyle{plain}
\bibliography{minion-systems}

\end{document}


***********************************************************************
To unsubscribe, send an e-mail to majordomo@seul.org with
unsubscribe freehaven-cvs       in the body. http://freehaven.net/