A Systematic Survey On Security in Anonymity Networks: Vulnerabilities, Attacks, Defenses, and Formalization

D Chao, D Xu, F Gao, C Zhang… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
The importance of safeguarding individuals' privacy rights in online activities is unmistakable
in today's anonymity networks. Since the introduction of Mixnet by Chaum, numerous …

Anonymity trilemma: Strong anonymity, low bandwidth overhead, low latency-choose two

D Das, S Meiser, E Mohammadi… - 2018 IEEE Symposium …, 2018 - ieeexplore.ieee.org
This work investigates the fundamental constraints of anonymous communication (AC)
protocols. We analyze the relationship between bandwidth overhead, latency overhead, and …

AnoA: A framework for analyzing anonymous communication protocols

M Backes, A Kate, P Manoharan… - 2013 IEEE 26th …, 2013 - ieeexplore.ieee.org
Protecting individuals' privacy in online communications has become a challenge of
paramount importance. To this end, anonymous communication (AC) protocols such as the …

TARDIS: a foundation of time-lock puzzles in UC

C Baum, B David, R Dowsley, JB Nielsen… - … Conference on the …, 2021 - Springer
Time-based primitives like time-lock puzzles (TLP) are finding widespread use in practical
protocols, partially due to the surge of interest in the blockchain space where TLPs and …

Breaking and (partially) fixing provably secure onion routing

C Kuhn, M Beck, T Strufe - 2020 IEEE Symposium on Security …, 2020 - ieeexplore.ieee.org
After several years of research on onion routing, Camenisch and Lysyanskaya, in an attempt
at rigorous analysis, defined an ideal functionality in the universal composability model …

Simplex consensus: A simple and fast consensus protocol

BY Chan, R Pass - Theory of Cryptography Conference, 2023 - Springer
We present a theoretical framework for analyzing the efficiency of consensus protocols, and
apply it to analyze the optimistic and pessimistic confirmation times of state-of-the-art …

A universally composable treatment of network time

R Canetti, K Hogan, A Malhotra… - 2017 IEEE 30th …, 2017 - ieeexplore.ieee.org
The security of almost any real-world distributed system today depends on the participants
having some" reasonably accurate" sense of current real time. Indeed, to name one …

Dynamic security aspects of onion routing

A Melloni, M Stam, Ø Ytrehus - IMA International Conference on …, 2023 - Springer
An anonymous communication network (ACN) is designed to protect the identities of two
parties communicating through it, even if an adversary controls or observes parts of the …

A survey on measuring anonymity in anonymous communication systems

T Lu, Z Du, ZJ Wang - IEEE Access, 2019 - ieeexplore.ieee.org
The popularity of Internet applications has made communication privacy an increasingly
important security requirement. As an important aspect of privacy, anonymity ensures that a …

[PDF][PDF] TARDIS: Time And Relative Delays In Simulation.

C Baum, B David, R Dowsley, JB Nielsen… - IACR Cryptol. ePrint …, 2020 - scholar.archive.org
This work introduces an extension of the UC framework with an abstract notion of time that
allows for modeling relative delays in communication and sequential computation without …