You are looking at a specific version 20190814:050350 of this paper. See the latest version.

Paper 2017/1000

No right to remain silent: Isolating Malicious Mixes

Hemi Leibowitz and Ania Piotrowska and George Danezis and Amir Herzberg

Abstract

Mix networks are a key technology to achieve network anonymity and private messaging, voting and database lookups. However, simple mix network designs are vulnerable to malicious mixes, which may drop or delay packets to facilitate traffic analysis attacks. Mix networks with provable robustness address this drawback through complex and expensive proofs of correct shuffling but come at a great cost and make limiting or unrealistic systems assumptions. We present Miranda, an efficient mix-net design, which mitigates active attacks by malicious mixes. Miranda uses both the detection of corrupt mixes, as well as detection of faults related to a pair of mixes, without detection of the faulty one among the two. Each active attack - including dropping packets - leads to reduced connectivity for corrupt mixes and reduces their ability to attack, and, eventually, to detection of corrupt mixes. We show, through experiments, the effectiveness of Miranda, by demonstrating how malicious mixes are detected and that attacks are neutralized early.

Note: This version also contains appendixes.

Metadata
Available format(s)
PDF
Publication info
Published elsewhere. Minor revision. To appear in Usenix security 2019
Keywords
Anonymitymix networksbyzantine attacks
Contact author(s)
leibo hemi @ gmail com
History
2019-08-14: last of 3 revisions
2017-10-11: received
See all versions
Short URL
https://ia.cr/2017/1000
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.