[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[minion-cvs] now our abstract doesn"t suck
Update of /home/minion/cvsroot/doc
In directory moria.seul.org:/home/arma/work/minion/doc
Modified Files:
minion-design.tex minion-design.bib
Log Message:
now our abstract doesn't suck
Index: minion-design.tex
===================================================================
RCS file: /home/minion/cvsroot/doc/minion-design.tex,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -d -r1.24 -r1.25
--- minion-design.tex 5 May 2002 19:30:14 -0000 1.24
+++ minion-design.tex 5 May 2002 23:21:43 -0000 1.25
@@ -49,19 +49,20 @@
\begin{abstract}
-We describe a packet-based anonymous remailer protocol that supports
-secure single-use reply blocks and includes link-level encryption to
-provide forward anonymity. We include designs for directory servers and
-nymservers that work with these single-use reply blocks. Because many of
-our design choices impact anonymity in surprising ways, we also include
-careful discussion of the anonymity implications of each step.
-
-% Mention conservativism of design to avoid reader let-down when they
-% find out we aren't Tarzan? -Nick
+We present Mixminion, a message-based anonymous remailer protocol that
+supports secure single-use reply blocks. Mixminion reply messages are
+indistinguishable from forward messages, allowing all messages to share
+the same anonymity set. We add directory servers that allow users to
+learn public keys and performance statistics of participating remailers,
+and we describe nymservers that allow users to maintain long-term
+pseudonyms using single-use reply blocks as a primitive. Our design
+integrates link-level encryption between remailers to provide
+forward anonymity. Mixminion brings together the best solutions from
+previous work to create a conservative design that protects against most
+known attacks.
-% We include justification
-%for various design decisions and a detailed description of attacks and
-%defenses. And some other stuff.
+%Because many of our design choices impact anonymity in surprising ways,
+%we include careful discussion of the anonymity implications of each step.
\end{abstract}
@@ -139,7 +140,11 @@
adversary, because in a free-route system an
adversary who owns many of the MIXes can use intersection attacks to
dramatically reduce the set of possible senders or receivers for a given
-message \cite{disad-free-routes}.
+message \cite{disad-free-routes}. On the other hand, cascades are more
+vulnerable \cite{batching-taxonomy} to trickle attacks, where an attacker
+targeting a specific message going into a mix can manipulate the batch
+of messages entering that mix so the only unknown message in the batch
+is the target message \cite{mixmaster-attacks,babel}.
MIX cascade research includes real-time MIXes \cite{realtime-mix} and
web MIXes \cite{web-mix}.
Index: minion-design.bib
===================================================================
RCS file: /home/minion/cvsroot/doc/minion-design.bib,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -d -r1.3 -r1.4
--- minion-design.bib 5 May 2002 08:18:48 -0000 1.3
+++ minion-design.bib 5 May 2002 23:21:43 -0000 1.4
@@ -22,6 +22,12 @@
pages = {10-29},
}
+@Misc{batching-taxonomy,
+ author = {Anonymous},
+ title = {On the Cost of Active Attacks Against Various Mixes},
+ howpublished = {Submitted to Information Hiding Workshop 2002},
+}
+
@InProceedings{langos02,
author = {Oliver Berthold and Heinrich Langos},
title = {Dummy Traffic Against Long Term Intersection Attacks},