[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[minion-cvs] now our abstract doesn"t suck

Update of /home/minion/cvsroot/doc
In directory moria.seul.org:/home/arma/work/minion/doc

Modified Files:
	minion-design.tex minion-design.bib 
Log Message:
now our abstract doesn't suck

Index: minion-design.tex
RCS file: /home/minion/cvsroot/doc/minion-design.tex,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -d -r1.24 -r1.25
--- minion-design.tex	5 May 2002 19:30:14 -0000	1.24
+++ minion-design.tex	5 May 2002 23:21:43 -0000	1.25
@@ -49,19 +49,20 @@
-We describe a packet-based anonymous remailer protocol that supports
-secure single-use reply blocks and includes link-level encryption to
-provide forward anonymity. We include designs for directory servers and
-nymservers that work with these single-use reply blocks. Because many of
-our design choices impact anonymity in surprising ways, we also include
-careful discussion of the anonymity implications of each step.
-% Mention conservativism of design to avoid reader let-down when they
-% find out we aren't Tarzan? -Nick
+We present Mixminion, a message-based anonymous remailer protocol that
+supports secure single-use reply blocks. Mixminion reply messages are
+indistinguishable from forward messages, allowing all messages to share
+the same anonymity set. We add directory servers that allow users to
+learn public keys and performance statistics of participating remailers,
+and we describe nymservers that allow users to maintain long-term
+pseudonyms using single-use reply blocks as a primitive. Our design
+integrates link-level encryption between remailers to provide
+forward anonymity. Mixminion brings together the best solutions from
+previous work to create a conservative design that protects against most
+known attacks.
-% We include justification
-%for various design decisions and a detailed description of attacks and
-%defenses. And some other stuff.
+%Because many of our design choices impact anonymity in surprising ways,
+%we include careful discussion of the anonymity implications of each step.
@@ -139,7 +140,11 @@
 adversary, because in a free-route system an
 adversary who owns many of the MIXes can use intersection attacks to
 dramatically reduce the set of possible senders or receivers for a given
-message \cite{disad-free-routes}.
+message \cite{disad-free-routes}. On the other hand, cascades are more
+vulnerable \cite{batching-taxonomy} to trickle attacks, where an attacker
+targeting a specific message going into a mix can manipulate the batch
+of messages entering that mix so the only unknown message in the batch
+is the target message \cite{mixmaster-attacks,babel}.
 MIX cascade research includes real-time MIXes \cite{realtime-mix} and
 web MIXes \cite{web-mix}.

Index: minion-design.bib
RCS file: /home/minion/cvsroot/doc/minion-design.bib,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -d -r1.3 -r1.4
--- minion-design.bib	5 May 2002 08:18:48 -0000	1.3
+++ minion-design.bib	5 May 2002 23:21:43 -0000	1.4
@@ -22,6 +22,12 @@
   pages =     {10-29},
+   author =      {Anonymous},
+   title =       {On the Cost of Active Attacks Against Various Mixes},
+   howpublished = {Submitted to Information Hiding Workshop 2002},
    author =      {Oliver Berthold and Heinrich Langos},
    title =       {Dummy Traffic Against Long Term Intersection Attacks},