A Systematic Survey On Security in Anonymity Networks: Vulnerabilities, Attacks, Defenses, and Formalization

D Chao, D Xu, F Gao, C Zhang… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
The importance of safeguarding individuals' privacy rights in online activities is unmistakable
in today's anonymity networks. Since the introduction of Mixnet by Chaum, numerous …

Anonymity trilemma: Strong anonymity, low bandwidth overhead, low latency-choose two

D Das, S Meiser, E Mohammadi… - 2018 IEEE Symposium …, 2018 - ieeexplore.ieee.org
This work investigates the fundamental constraints of anonymous communication (AC)
protocols. We analyze the relationship between bandwidth overhead, latency overhead, and …

AnoA: A framework for analyzing anonymous communication protocols

M Backes, A Kate, P Manoharan… - 2013 IEEE 26th …, 2013 - ieeexplore.ieee.org
Protecting individuals' privacy in online communications has become a challenge of
paramount importance. To this end, anonymous communication (AC) protocols such as the …

The privacy of the TLS 1.3 protocol

G Arfaoui, X Bultel, PA Fouque, A Nedelcu… - Cryptology ePrint …, 2019 - eprint.iacr.org
Abstract TLS (Transport Layer Security) is a widely deployed protocol that plays a vital role
in securing Internet trafic. Given the numerous known attacks for TLS 1.2, it was imperative …

On privacy notions in anonymous communication

C Kuhn, M Beck, S Schiffner, E Jorswieck… - arXiv preprint arXiv …, 2018 - arxiv.org
Many anonymous communication networks (ACNs) with different privacy goals have been
developed. However, there are no accepted formal definitions of privacy and ACNs often …

Talek: Private group messaging with hidden access patterns

R Cheng, W Scott, E Masserova, I Zhang… - Proceedings of the 36th …, 2020 - dl.acm.org
Talek is a private group messaging system that sends messages through potentially
untrustworthy servers, while hiding both data content and the communication patterns …

Boomerang:{Metadata-Private} Messaging under Hardware Trust

P Jiang, Q Wang, J Cheng, C Wang, L Xu… - … USENIX Symposium on …, 2023 - usenix.org
In end-to-end encrypted (E2EE) messaging systems, protecting communication metadata,
such as who is communicating with whom, at what time, etc., remains a challenging …

Breaking and (partially) fixing provably secure onion routing

C Kuhn, M Beck, T Strufe - 2020 IEEE Symposium on Security …, 2020 - ieeexplore.ieee.org
After several years of research on onion routing, Camenisch and Lysyanskaya, in an attempt
at rigorous analysis, defined an ideal functionality in the universal composability model …

(Nothing else) MATor (s) monitoring the anonymity of Tor's path selection

M Backes, A Kate, S Meiser… - Proceedings of the 2014 …, 2014 - dl.acm.org
In this paper we present MATor: a framework for rigorously assessing the degree of
anonymity in the Tor network. The framework explicitly addresses how user anonymity is …

[PDF][PDF] Dust: A blocking-resistant internet transport protocol

B Wiley - Technical rep ort. http://blanu. net/Dust. pdf, 2011 - freehaven.net
Censorship of information on the Internet has been an increasing problem as the methods
have become more sophisticated and increasing resources have been allocated to censor …