Cryptology ePrint Archive: Report 2013/531

On the Limits of Provable Anonymity

Nethanel Gelernter and Amir Herzberg

Abstract: We study provably secure anonymity, focusing on ultimate anonymity - strongest-possible anonymity requirements and adversaries. We begin with rigorous definition of anonymity against wide range of computationally-bounded attackers, including eavesdroppers, malicious peers, malicious destina-tions, and their combinations. Following the work of Hevia and Micciancio [15], our definition is generic, and captures di erent notions of anonymity (e.g., unobservability and sender anonymity). We then study the feasibility of ultimate anonymity. We show there is a protocol satisfying this requirement, but with absurd (although polynomial) inefficiency and overhead. We show that such inefficiency and overhead is unavoidable for `ultimate anonymity'. We then present a slightly-relaxed requirement and present feasible protocols for it.

Category / Keywords: anonymity

Original Publication (with minor differences): WPES 2013

Date: received 25 Aug 2013, last revised 12 Sep 2013

Contact author: nethanel gelernter at gmail com

Available format(s): PDF | BibTeX Citation

Version: 20130912:094033 (All versions of this report)

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]