You are looking at a specific version 20171011:154319 of this paper. See the latest version.

Paper 2017/1000

No right to remain silent: Isolating Malicious Mixes

Hemi Leibowitz and Ania Piotrowska and George Danezis and Amir Herzberg

Abstract

Mix networks are a key technology to provide network anonymity, used for messaging, voting and private lookups. However, simple mix networks are insecure against malicious mixes, which can drop or delay packets to facilitate traffic analysis attacks. Mix networks with provable robustness address this by using complex and expensive proofs of correct shuffling, which come with a cost and make assumptions that are unnatural to many settings in which mix networks are deployed. We present \sysname, a synchronous mix network mechanism, which is provably secure against malicious mixes -- yet retaining the simplicity, efficiency and practicality of mix network designs. \sysname\ uses first-hand experience of unreliability by mixes and clients, to derive a mix `reputation', and to ensure that each active attack -- including dropping of packets -- results in reduction in the connectivity of the malicious mixes, thus reducing their ability to attack. Besides the practical importance of \sysname itself, our results are applicable to other mix networks designs and anonymous communication, and even unrelated settings in which reputation could provide effective defense against malicious participants.

Metadata
Available format(s)
PDF
Publication info
Preprint. MINOR revision.
Keywords
Anonymitymix networksbyzantine attacks
Contact author(s)
Leibo hemi @ gmail com
History
2019-08-14: last of 3 revisions
2017-10-11: received
See all versions
Short URL
https://ia.cr/2017/1000
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.