[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[minion-cvs] Fix definition of ideal anonymity and formula for synch...
Update of /home/minion/cvsroot/doc
In directory moria.seul.org:/tmp/cvs-serv14284
Modified Files:
minion-design.tex
Log Message:
Fix definition of ideal anonymity and formula for synchronous batching latency.
Index: minion-design.tex
===================================================================
RCS file: /home/minion/cvsroot/doc/minion-design.tex,v
retrieving revision 1.51
retrieving revision 1.52
diff -u -d -r1.51 -r1.52
--- minion-design.tex 8 May 2002 06:39:32 -0000 1.51
+++ minion-design.tex 8 May 2002 13:34:26 -0000 1.52
@@ -876,7 +876,7 @@
of opportunity for this attack.
A more complete solution to partitioning attacks may be possible by
-using the ``synchronous batch'' approach described in
+using the ``synchronous batching'' approach described in
Section \ref{subsec:batching}; this is a subject for future research.
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
@@ -1076,18 +1076,23 @@
%attention to it yet.]
A MIX-net design groups messages into batches and chooses paths; the
-approaches it uses affect the degree of anonymity it can provide. We
-might define ideal anonymity for a MIX-net to be when each message leaving
-(resp. entering) the network could correspond with uniform probability
-to any message entering (resp. leaving) the network, during a period
-approximately equal to the maximum network latency.
+approaches it uses affect the degree of anonymity it can provide
+\cite{batching-taxonomy}.
+We might define ideal anonymity for a MIX-net to be when an attacker can
+gain no information about the linkage between messages entering and
+leaving the network, other than that the maximum time between them is
+equal to the maximum network latency.
+
+% Silly newbie mistake: the probability is the same as a priori, not
+% uniform. That's what I get for writing security definitions at 1:00
+% in the morning. -DH
This ideal is not achieved by protocols like Mixmaster that use random
delays: if the maximum latency of such a network is $t$, then the
anonymity set of a message leaving the network may be much smaller
than all messages that entered over a time $t$.
% This is handwaving, and the problem is more that the distribution
-% isn't uniform rather than the actual size of the anonymity set.
+% isn't right rather than the actual size of the anonymity set.
% It'll do for the time being. -DH
Also, because Mixmaster is both {\em asynchronous} (messages can enter and
@@ -1095,7 +1100,6 @@
the attacks described in Section 4 of \cite{disad-free-routes}.
% Should really summarise them, but I don't have time :-(
We would like to explore a
-%One possible approach that we want to explore using Mixminion is a
strategy called {\em synchronous batching}. This approach seems to prevent
these attacks even when free routes are used, and seems to improve the
trade-off between latency and anonymity.
@@ -1114,8 +1118,7 @@
The latency is between $\ell t_\mathrm{hop}$ and $t_\mathrm{batch} +
\ell t_\mathrm{hop}$, depending on when the message was submitted.
-Typically we would have $t_\mathrm{hop} < t_\mathrm{batch}/n$, where
-$n$ is the number of MIXes in the network, so the
+Typically we would have $t_\mathrm{hop} < t_\mathrm{batch}/\ell$, so the
latency is at most $2t_\mathrm{batch}$ independent of the path length
$\ell$.