Paper 2017/1000
No right to remain silent: Isolating Malicious Mixes
Hemi Leibowitz and Ania Piotrowska and George Danezis and Amir Herzberg
Abstract
Mix networks are a key technology to provide network anonymity, used for messaging, voting and private lookups. However, simple mix networks are insecure against malicious mixes, which can drop or delay packets to facilitate traffic analysis attacks. Mix networks with provable robustness address this by using complex and expensive proofs of correct shuffling, which come with a cost and make assumptions that are unnatural to many settings in which mix networks are deployed. We present \sysname, a synchronous mix network mechanism, which is provably secure against malicious mixes -- yet retaining the simplicity, efficiency and practicality of mix network designs. \sysname\ uses first-hand experience of unreliability by mixes and clients, to derive a mix `reputation', and to ensure that each active attack -- including dropping of packets -- results in reduction in the connectivity of the malicious mixes, thus reducing their ability to attack. Besides the practical importance of \sysname itself, our results are applicable to other mix networks designs and anonymous communication, and even unrelated settings in which reputation could provide effective defense against malicious participants.
Metadata
- Available format(s)
- Publication info
- Preprint. MINOR revision.
- Keywords
- Anonymitymix networksbyzantine attacks
- Contact author(s)
- Leibo hemi @ gmail com
- History
- 2019-08-14: last of 3 revisions
- 2017-10-11: received
- See all versions
- Short URL
- https://ia.cr/2017/1000
- License
-
CC BY