메뉴 건너뛰기




Volumn 42, Issue 1, 2009, Pages

On anonymity in an electronic society: A survey of anonymous communication systems

Author keywords

Anonymity; Anonymous communication; DC nets; Mix networks; Mixes; Onion; Privacy; Routing; Traffic analysis

Indexed keywords

ANONYMITY; ANONYMOUS COMMUNICATION; DC-NETS; MIX NETWORKS; MIXES; ONION; PRIVACY; ROUTING; TRAFFIC ANALYSIS;

EID: 77955872093     PISSN: 03600300     EISSN: 15577341     Source Type: Journal    
DOI: 10.1145/1592451.1592456     Document Type: Review
Times cited : (104)

References (102)
  • 1
    • 3242775234 scopus 로고    scopus 로고
    • On the economics of anonymity
    • R. N. Wright, Ed. Lecture Notes in Computer Science, vol. 2742. Springer-Verlag, Berlin, Germany
    • ACQUISTI, A., DINGLEDINE, R., ANDSYVERSON, P. 2003. On the economics of anonymity. In Proceedings of the Financial Cryptography (FC'03), R. N. Wright, Ed. Lecture Notes in Computer Science, vol. 2742. Springer-Verlag, Berlin, Germany.
    • (2003) Proceedings of the Financial Cryptography (FC'03)
    • Acquisti, A.1    Dingledine, R.2    Syverson, P.3
  • 3
    • 84947242344 scopus 로고    scopus 로고
    • Traffic analysis attacks and trade-offs in anonymity providing systems
    • I. S. Moskowitz, Ed. Lecture Notes in Computer Science, vol. 2173. Springer-Verlag, Berlin, Germany
    • BACK, A., MÖLLER, U., ANDSTIGLIC, A. 2001. Traffic analysis attacks and trade-offs in anonymity providing systems. In Proceedings of the Information Hiding Workshop (IH'01), I. S. Moskowitz, Ed. Lecture Notes in Computer Science, vol. 2173. Springer-Verlag, Berlin, Germany, 245-257.
    • (2001) Proceedings of the Information Hiding Workshop (IH'01) , pp. 245-257
    • Back, A.1    Möller, U.2    Stiglic, A.3
  • 4
    • 13644250069 scopus 로고    scopus 로고
    • Buses for anonymous message delivery
    • BEIMEL, A. ANDDOLEV, S. 2003. Buses for anonymous message delivery. J. Cryptol. 16, 1, 25-39.
    • (2003) J. Cryptol. , vol.16 , Issue.1 , pp. 25-39
    • Beimel, A.1    Dolev, S.2
  • 6
    • 0001868672 scopus 로고
    • Optimal asymmetric encryption-how to encrypt with rsa
    • BELLARE, M. ANDROGAWAY, P. 1994. Optimal asymmetric encryption-how to encrypt with rsa. In Proceedings of EUROCRYPT.
    • (1994) Proceedings of EUROCRYPT
    • Bellare, M.1    Rogaway, P.2
  • 8
    • 0037974470 scopus 로고    scopus 로고
    • Dummy traffic against long term intersection attacks
    • R. Dingledine and P. Syverson, Eds. Lecture Notes in Computer Science, vol. 2482. Springer-Verlag, Berlin, Germany
    • BERTHOLD, O. ANDLANGOS, H. 2002. Dummy traffic against long term intersection attacks. In Proceedings of Privacy Enhancing Technologies Workshop (PET'02), R. Dingledine and P. Syverson, Eds. Lecture Notes in Computer Science, vol. 2482. Springer-Verlag, Berlin, Germany.
    • (2002) Proceedings of Privacy Enhancing Technologies Workshop (PET'02)
    • Berthold, O.1    Langos, H.2
  • 11
    • 56649105529 scopus 로고    scopus 로고
    • Denial of service or denial of security? How attacks on reliability can compromise anonymity
    • BORISOV, N., DANEZIS, G.,MITTAL, P., ANDTABRIZ, P. 2007. Denial of service or denial of security? How attacks on reliability can compromise anonymity. In Proceedings of CCS.
    • (2007) Proceedings of CCS
    • Borisov, N.1    Danezis, G.2    Mittal, P.3    Tabriz, P.4
  • 12
    • 0038684291 scopus 로고    scopus 로고
    • White paper. Zero Knowledge Systems, Inc. December. Zero Knowledge Systems, Inc., Montreal, P.Q., Canada
    • BOUCHER, P., SHOSTACK, A., ANDGOLDBERG, I. 2000. Freedom systems 2.0 architecture. White paper. Zero Knowledge Systems, Inc. December. Zero Knowledge Systems, Inc., Montreal, P.Q., Canada.
    • (2000) Freedom Systems 2.0 Architecture
    • Boucher, P.1    Shostack, A.2    Goldberg, I.3
  • 15
    • 24944435537 scopus 로고    scopus 로고
    • Compact e-cash
    • R. Cramer, Ed. Lecture Notes in Computer Science, vol. 3494. Springer, Berlin, Germany
    • CAMENISCH, J.,HOHENBERGER, S., ANDLYSYANSKAYA, A. 2005. Compact e-cash. In Proceedings of EUROCRYPT 2005, R. Cramer, Ed. Lecture Notes in Computer Science, vol. 3494. Springer, Berlin, Germany, 302-321.
    • (2005) Proceedings of EUROCRYPT 2005 , pp. 302-321
    • Camenisch, J.1    Hohenberger, S.2    Lysyanskaya, A.3
  • 17
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • CHAUM, D. 1981. Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24, 2 (Feb.), 84-88.
    • (1981) Commun. ACM , vol.24 , Issue.2 FEBRUARY , pp. 84-88
    • Chaum, D.1
  • 18
    • 0023861309 scopus 로고
    • The dining cryptographers problem: Unconditional sender and recipient untraceability
    • CHAUM, D. 1988. The dining cryptographers problem: Unconditional sender and recipient untraceability. J. Cryptol. 1, 65-75.
    • (1988) J. Cryptol. , vol.1 , pp. 65-75
    • Chaum, D.1
  • 20
    • 77955913009 scopus 로고    scopus 로고
    • CITIZEN LAB
    • CITIZEN LAB. 2008. Psiphon. http://psiphon.civisec.org.
    • (2008)
  • 23
    • 84947289387 scopus 로고    scopus 로고
    • Real world patterns of failure in anonymity systems
    • I. S.Moskowitz, Ed. Lecture Notes in Computer Science, vol. 2173. Springer-Verlag, Berlin, Germany
    • CLAYTON, R., DANEZIS, G., ANDKUHN, M. G. 2001. Real world patterns of failure in anonymity systems. In Proceedings of the Information HidingWorkshop (IH'01), I. S.Moskowitz, Ed. Lecture Notes in Computer Science, vol. 2173. Springer-Verlag, Berlin, Germany, 230-244.
    • (2001) Proceedings of the Information HidingWorkshop (IH'01) , pp. 230-244
    • Clayton, R.1    Danezis, G.2    Kuhn, M.G.3
  • 27
    • 35248866624 scopus 로고    scopus 로고
    • Mix-networks with restricted routes
    • R. Dingledine, Ed. Lecture Notes in Computer Science, vol. 2760. Springer-Verlag, Berlin, Germany
    • DANEZIS, G. 2003a. Mix-networks with restricted routes. In Proceedings of Privacy Enhancing Technologies Workshop (PET'03), R. Dingledine, Ed. Lecture Notes in Computer Science, vol. 2760. Springer-Verlag, Berlin, Germany, 1-17.
    • (2003) Proceedings of Privacy Enhancing Technologies Workshop (PET'03) , pp. 1-17
    • Danezis, G.1
  • 28
    • 84904332394 scopus 로고    scopus 로고
    • Statistical disclosure attacks: Traffic confirmation in open environments
    • G. Gritzalis, Vimercati, Samarati, and Katsikas, Eds. IFIP TC11. Kluwer, Dordrecht, The Netherlands
    • DANEZIS, G. 2003b. Statistical disclosure attacks: Traffic confirmation in open environments. In Proceedings of Security and Privacy in the Age of Uncertainty (SEC'03), G. Gritzalis, Vimercati, Samarati, and Katsikas, Eds. IFIP TC11. Kluwer, Dordrecht, The Netherlands, 421-426.
    • (2003) Proceedings of Security and Privacy in the Age of Uncertainty (SEC'03) , pp. 421-426
    • Danezis, G.1
  • 29
    • 24344460554 scopus 로고    scopus 로고
    • The traffic analysis of continuous-time mixes
    • Lecture Notes in Computer Science, vol. 3424. Springer-Verlag, Berlin, Germany
    • DANEZIS, G. 2004. The traffic analysis of continuous-time mixes. In Proceedings of Privacy Enhancing Technologies Workshop (PET'04). Lecture Notes in Computer Science, vol. 3424. Springer-Verlag, Berlin, Germany, 35-50.
    • (2004) Proceedings of Privacy Enhancing Technologies Workshop (PET'04) , pp. 35-50
    • Danezis, G.1
  • 30
    • 84865507939 scopus 로고    scopus 로고
    • Introducing traffic analysis
    • A. Acquisti, S. Gritzalis, C. Lambrinoudakis, and S. di Vimercati, Eds. Auerbach Publications, Boca Raton, FL, Chapter 5
    • DANEZIS, G. ANDCLAYTON, R. 2007. Introducing traffic analysis. In Digital Privacy: Theory, Technologies, and Practices, A. Acquisti, S. Gritzalis, C. Lambrinoudakis, and S. di Vimercati, Eds. Auerbach Publications, Boca Raton, FL, Chapter 5, 95-117.
    • (2007) Digital Privacy: Theory, Technologies, and Practices , pp. 95-117
    • Danezis, G.1    Clayton, R.2
  • 36
    • 35248882142 scopus 로고    scopus 로고
    • Generalising mixes
    • R. Dingledine, Ed. Lecture Notes in Computer Science, vol. 2760. Springer-Verlag, Berlin, Germany
    • DÍAZ, C. ANDSERJANTOV, A. 2003. Generalising mixes. In Proceedings of Privacy Enhancing Technologies Workshop (PET'03), R. Dingledine, Ed. Lecture Notes in Computer Science, vol. 2760. Springer-Verlag, Berlin, Germany, 18-31.
    • (2003) Proceedings of Privacy Enhancing Technologies Workshop (PET'03) , pp. 18-31
    • Díaz, C.1    Serjantov, A.2
  • 42
    • 34948854809 scopus 로고    scopus 로고
    • Deploying low-latency anonymity: Design challenges and social factors
    • DINGLEDINE, R., MATHEWSON, N., ANDSYVERSON, P. 2007. Deploying low-latency anonymity: Design challenges and social factors. IEEE Sec. Priv. 5, 5, 83-87.
    • (2007) IEEE Sec. Priv. , vol.5 , Issue.5 , pp. 83-87
    • Dingledine, R.1    Mathewson, N.2    Syverson, P.3
  • 44
    • 24344487256 scopus 로고    scopus 로고
    • Synchronous batching: From cascades to free routes
    • Lecture Notes in Computer Science, vol. 3424. Springer-Verlag, Berlin, Germany
    • DINGLEDINE, R., SHMATIKOV, V., ANDSYVERSON, P. 2004b. Synchronous batching: From cascades to free routes. In Proceedings of the Privacy Enhancing Technologies Workshop (PET'04). Lecture Notes in Computer Science, vol. 3424. Springer-Verlag, Berlin, Germany, 186-206.
    • (2004) Proceedings of the Privacy Enhancing Technologies Workshop (PET'04) , pp. 186-206
    • Dingledine, R.1    Shmatikov, V.2    Syverson, P.3
  • 45
    • 77955914776 scopus 로고    scopus 로고
    • ELECTRONIC PRIVACY INFORMATION CENTER
    • ELECTRONIC PRIVACY INFORMATION CENTER. 2005. Carnivore. http://epic.org/privacy/carnivore/.
    • (2005) Carnivore
  • 50
    • 84955557456 scopus 로고    scopus 로고
    • Hiding routing information
    • R. Anderson, Ed. Lecture Notes in Computer Science, vol. 1174. Springer-Verlag, Berlin, Germany
    • GOLDSCHLAG, D. M., REED, M. G., ANDSYVERSON, P. F. 1996. Hiding routing information. In Proceedings of Information Hiding: First International Workshop, R. Anderson, Ed. Lecture Notes in Computer Science, vol. 1174. Springer-Verlag, Berlin, Germany, 137-150.
    • (1996) Proceedings of Information Hiding: First International Workshop , pp. 137-150
    • Goldschlag, D.M.1    Reed, M.G.2    Syverson, P.F.3
  • 57
    • 6344251217 scopus 로고    scopus 로고
    • Fingerprinting websites using traffic analysis
    • R. Dingledine and P. Syverson, Eds. Lecture Notes in Computer Science, vol. 2482. Springer-Verlag, Berlin, Germany
    • HINTZ, A. 2002. Fingerprinting websites using traffic analysis. In Proceedings of Privacy Enhancing Technologies Workshop (PET'02), R. Dingledine and P. Syverson, Eds. Lecture Notes in Computer Science, vol. 2482. Springer-Verlag, Berlin, Germany.
    • (2002) Proceedings of Privacy Enhancing Technologies Workshop (PET'02)
    • Hintz, A.1
  • 59
    • 85084162002 scopus 로고    scopus 로고
    • Making mix nets robust for electronic voting by randomized partial checking
    • JONDOS GMBH. 2008. Jondonym
    • JAKOBSSON, M., JUELS, A., ANDRIVEST, R. L. 2002. Making mix nets robust for electronic voting by randomized partial checking. In Proceedings of the 11th USENIX Security Symposium. JONDOS GMBH. 2008. Jondonym. https://www.jondos.de/ en/.
    • (2002) Proceedings of the 11th USENIX Security Symposium
    • Jakobsson, M.1    Juels, A.2    Rivest, R.L.3
  • 61
    • 1642380665 scopus 로고    scopus 로고
    • Limits of anonymity in open environments
    • F. Petitcolas, Ed. Lecture Notes in Computer Science, vol. 2578. Springer-Verlag, Berlin, Germany
    • KESDOGAN, D., AGRAWAL, D., ANDPENZ, S. 2002. Limits of anonymity in open environments. In Proceedings of Information HidingWorkshop (IH'02), F. Petitcolas, Ed. Lecture Notes in Computer Science, vol. 2578. Springer-Verlag, Berlin, Germany.
    • (2002) Proceedings of Information HidingWorkshop (IH'02)
    • Kesdogan, D.1    Agrawal, D.2    Penz, S.3
  • 62
    • 84890010554 scopus 로고    scopus 로고
    • Stop-and-go MIXes: Providing probabilistic anonymity in an open system
    • Lecture Notes in Computer Science, vol. 1525. Springer-Verlag, Berlin, Germany
    • KESDOGAN, D., EGNER, J., ANDBÜSCHKES, R. 1998. Stop-and-go MIXes: Providing probabilistic anonymity in an open system. In Proceedings of Information Hiding Workshop (IH'98). Lecture Notes in Computer Science, vol. 1525. Springer-Verlag, Berlin, Germany.
    • (1998) Proceedings of Information Hiding Workshop (IH'98)
    • Kesdogan, D.1    Egner, J.2    Büschkes, R.3
  • 64
    • 0001574460 scopus 로고
    • Receipt-free MIX-type voting scheme-a practical solution to the implementation of a voting booth
    • Springer-Verlag, Berlin, Germany
    • KILIAN, J. ANDSAKO, K. 1995. Receipt-free MIX-type voting scheme-a practical solution to the implementation of a voting booth. In Proceedings of EUROCRYPT 1995. Springer-Verlag, Berlin, Germany.
    • (1995) Proceedings of EUROCRYPT 1995
    • Kilian, J.1    Sako, K.2
  • 66
    • 33846288517 scopus 로고    scopus 로고
    • Timing attacks in low-latency mix-based systems
    • A. Juels, Ed. Lecture Notes in Computer Science, vol. 3110. Springer-Verlag, Berlin, Germany
    • LEVINE, B. N., REITER, M. K., WANG, C., ANDWRIGHT, M. K. 2004. Timing attacks in low-latency mix-based systems. In Proceedings of Financial Cryptography (FC'04), A. Juels, Ed. Lecture Notes in Computer Science, vol. 3110. Springer-Verlag, Berlin, Germany, 251-265.
    • (2004) Proceedings of Financial Cryptography (FC'04) , pp. 251-265
    • Levine, B.N.1    Reiter, M.K.2    Wang, C.3    Wright, M.K.4
  • 68
    • 24344478834 scopus 로고    scopus 로고
    • Practical traffic analysis: Extending and resisting statistical disclosure
    • Lecture Notes in Computer Science, vol. 3424. Berlin, Germany
    • MATHEWSON, N. ANDDINGLEDINE, R. 2004. Practical traffic analysis: Extending and resisting statistical disclosure. In Proceedings of Privacy Enhancing Technologies workshop (PET'04). Lecture Notes in Computer Science, vol. 3424. Berlin, Germany, 17-34.
    • (2004) Proceedings of Privacy Enhancing Technologies Workshop (PET'04) , pp. 17-34
    • Mathewson, N.1    Dingledine, R.2
  • 72
    • 34547281136 scopus 로고    scopus 로고
    • Salsa: A structured approach to large-scale anonymity
    • NAMBIAR, A. ANDWRIGHT, M. 2006. Salsa: A structured approach to large-scale anonymity. In Proceedings of CCS.
    • (2006) Proceedings of CCS
    • Nambiar, A.1    Wright, M.2
  • 77
    • 77955854309 scopus 로고    scopus 로고
    • Improving efficiency and simplicity of Tor circuit establishment and hidden services
    • N. Borisov and P. Golle, Eds. Springer, Ottawa, Canada
    • ØVERLIER, L. AND SYVERSON, P. 2007. Improving efficiency and simplicity of Tor circuit establishment and hidden services. In Proceedings of the 7th Workshop on Privacy Enhancing Technologies (PET'07), N. Borisov and P. Golle, Eds. Springer, Ottawa, Canada.
    • (2007) Proceedings of the 7th Workshop on Privacy Enhancing Technologies (PET'07)
    • Øverlier, L.1    Syverson, P.2
  • 78
    • 53349102286 scopus 로고    scopus 로고
    • Prospects for remailers
    • PAREKH, S. 1996. Prospects for remailers. First Monday 1, 2 (Aug).
    • (1996) First Monday , vol.1 , Issue.2 AUGUST
    • Parekh, S.1
  • 79
    • 85052820050 scopus 로고    scopus 로고
    • Anonymity, unobservability, and pseudonymity: A consolidated proposal for terminology
    • PFITZMANN, A. ANDHANSEN, M. 2008. Anonymity, unobservability, and pseudonymity: A consolidated proposal for terminology. Draft.
    • (2008) Draft
    • Pfitzmann, A.1    Hansen, M.2
  • 83
    • 0002054934 scopus 로고    scopus 로고
    • Crowds: Anonymity forWeb transactions
    • REITER, M. ANDRUBIN, A. 1998. Crowds: Anonymity forWeb transactions. ACM Trans. Inform. Syst. Sec. 1, 1 (Nov.), 66-92.
    • (1998) ACM Trans. Inform. Syst. Sec. , vol.1 , Issue.1 NOVEMBER , pp. 66-92
    • Reiter, M.1    Rubin, A.2
  • 85
    • 84976664565 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • RIVEST, R. L., SHAMIR, A., ANDADLEMAN, L. 1983. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 26, 1, 96-99.
    • (1983) Commun. ACM , vol.26 , Issue.1 , pp. 96-99
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 87
    • 2642544584 scopus 로고    scopus 로고
    • From a trickle to a flood: Active attacks on several mix types
    • F. Petitcolas, Ed. Lecture Notes in Computer Science, vol. 2578. Springer-Verlag, Berlin, Germany
    • SERJANTOV, A., DINGLEDINE, R., ANDSYVERSON, P. 2002. From a trickle to a flood: Active attacks on several mix types. In Proceedings of the Information Hiding Workshop (IH'02), F. Petitcolas, Ed. Lecture Notes in Computer Science, vol. 2578. Springer-Verlag, Berlin, Germany.
    • (2002) Proceedings of the Information Hiding Workshop (IH'02)
    • Serjantov, A.1    Dingledine, R.2    Syverson, P.3
  • 89
    • 27944452198 scopus 로고    scopus 로고
    • Passive attack analysis for connection-based anonymity systems
    • SERJANTOV, A. ANDSEWELL, P. 2003. Passive attack analysis for connection-based anonymity systems. In Proceedings of ESORICS.
    • (2003) Proceedings of ESORICS
    • Serjantov, A.1    Sewell, P.2
  • 91
    • 70349301114 scopus 로고    scopus 로고
    • Timing analysis in low-latency mix networks: Attacks and defenses
    • SHMATIKOV, V. ANDWANG, M.-H. 2006. Timing analysis in low-latency mix networks: Attacks and defenses. In Proceedings of ESORICS.
    • (2006) Proceedings of ESORICS
    • Shmatikov, V.1    Wang, M.-H.2
  • 97
    • 6244294214 scopus 로고
    • The dining cryptographers in the disco: Unconditional sender and recipient untraceability
    • Lecture Notes in Computer Science, vol. 434. Springer-Verlag, Berlin, Germany
    • WAIDNER, M. ANDPFITZMANN, B. 1990. The dining cryptographers in the disco: Unconditional sender and recipient untraceability. In Proceedings of EUROCRYPT 1989. Lecture Notes in Computer Science, vol. 434. Springer-Verlag, Berlin, Germany.
    • (1990) Proceedings of EUROCRYPT 1989
    • Waidner, M.1    Pfitzmann, B.2
  • 99
    • 85084163931 scopus 로고    scopus 로고
    • Publius: A robust, tamper-evident, censorship-resistant and source-anonymous Web publishing system
    • WALDMAN, M., RUBIN, A., ANDCRANOR, L. 2000. Publius: A robust, tamper-evident, censorship-resistant and source-anonymous Web publishing system. In Proceedings of the 9th USENIX Security Symposium. 59-72.
    • (2000) Proceedings of the 9th USENIX Security Symposium , pp. 59-72
    • Waldman, M.1    Rubin, A.2    Cranor, L.3
  • 101
    • 14544273666 scopus 로고    scopus 로고
    • The predecessor attack: An analysis of a threat to anonymous communications systems
    • WRIGHT, M., ADLER, M., LEVINE, B. N., ANDSHIELDS, C. 2004. The predecessor attack: An analysis of a threat to anonymous communications systems. ACM Trans. Inform. Syst. Sec. 4, 7 (Nov.), 489-522.
    • (2004) ACM Trans. Inform. Syst. Sec. , vol.4 , Issue.7 NOVEMBER , pp. 489-522
    • Wright, M.1    Adler, M.2    Levine, B.N.3    Shields, C.4
  • 102
    • 24344450770 scopus 로고    scopus 로고
    • On flow correlation attacks and countermeasures in mix networks
    • Lecture Notes in Computer Science, vol. 3424. Berlin, Germany
    • ZHU, Y., FU, X., GRAHAM, B., BETTATI, R., ANDZHAO, W. 2004. On flow correlation attacks and countermeasures in mix networks. In Proceedings of Privacy Enhancing Technologies Workshop (PET'04). Lecture Notes in Computer Science, vol. 3424. Berlin, Germany, 207-225.
    • (2004) Proceedings of Privacy Enhancing Technologies Workshop (PET'04) , pp. 207-225
    • Zhu, Y.1    Fu, X.2    Graham, B.3    Bettati, R.4    Zhao, W.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.