Byzantine attacks on anonymity systems

Nikita Borisov, George Danezis, Parisa Tabriz

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

In the study of anonymous systems, research into new designs for anonymity has been balanced by analysis of attack strategies for violating anonymity. Such strategies shed light on how well systems will defend users’ privacy and suggest new directions for research and development. Any analysis of attacks, however, must be parameterized by a model of adversary capabilities. The choice of model has been evolving over the years; for example, as the scale of anonymous systems has grown, the popular global passive adversary becomes less realistic and a more limited adversary may be more appropriate [36]. At the same time, with more loose dynamics connecting the participants of today’s anonymous networks, the likelihood that a large number of participants may be compromised and colluding together is perhaps higher than it used to be. This motivates deeper study of attacks that such participating adversaries can pose.

Original languageEnglish (US)
Title of host publicationDigital Privacy
Subtitle of host publicationTheory, Technologies, and Practices
PublisherCRC Press
Pages73-93
Number of pages21
ISBN (Electronic)9781420052183
ISBN (Print)9781420052176
StatePublished - Jan 1 2007

ASJC Scopus subject areas

  • General Computer Science
  • General Economics, Econometrics and Finance
  • General Business, Management and Accounting

Fingerprint

Dive into the research topics of 'Byzantine attacks on anonymity systems'. Together they form a unique fingerprint.

Cite this