Access the full text.
Sign up today, get DeepDyve free for 14 days.
L. Nguyen, R. Safavi-Naini (2003)
Breaking and Mending Resilient Mix-Nets
Chen Chen, D. Asoni, David Barrera, G. Danezis, A. Perrig (2015)
HORNET: High-speed Onion Routing at the Network LayerProceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security
Alan Donovan, B. Kernighan (2015)
The Go Programming Language
Nirvan Tyagi, Y. Gilad, M. Zaharia, N. Zeldovich (2017)
Stadium: A Distributed Metadata-Private Messaging SystemProceedings of the 26th Symposium on Operating Systems Principles
Tim Ruffing, Pedro Moreno-Sánchez, Aniket Kate (2017)
P2P Mixing and Unlinkable Bitcoin TransactionsIACR Cryptol. ePrint Arch., 2016
R. Schuster, Vitaly Shmatikov, Eran Tromer (2017)
Beauty and the Burst: Remote Identification of Encrypted Video Streams
D. Wolinsky, Ewa Syta, B. Ford (2013)
Hang with your buddies to resist intersection attacksProceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, I. Goldberg (2014)
Effective Attacks and Provable Defenses for Website Fingerprinting
Tao Wang, I. Goldberg (2013)
Improved website fingerprinting on TorProceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Pablo García, J. Graaf, G. Montejano, D. Riesco, N. Debnath, S. Bast (2015)
Storage Optimization for Non Interactive Dining Cryptographers (NIDC)2015 12th International Conference on Information Technology - New Generations
J. Korhonen, Ye Wang (2005)
Effect of packet size on loss rate and delay in wireless linksIEEE Wireless Communications and Networking Conference, 2005, 3
Sharad Goel, Mark Robson, Milo Polte, E. Sirer (2003)
Herbivore: A Scalable and Efficient Protocol for Anonymous Communication
Sebastian Angel, Srinath Setty (2016)
Unobservable Communication over Fully Untrusted Infrastructure
Architecture to thwart denial of service attacks
Dominik Herrmann, Rolf Wendolsky, H. Federrath (2009)
Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial naïve-bayes classifier
D. Lazar, Y. Gilad, N. Zeldovich (2019)
YodelProceedings of the 27th ACM Symposium on Operating Systems Principles
Ewa Syta, Benjamin Peterson, D. Wolinsky, M. Fischer, B. Ford (2014)
Deniable Anonymous Group Authentication
Henry Corrigan-Gibbs, D. Wolinsky, B. Ford (2012)
Proactively Accountable Anonymous Messaging in Verdict
C. Wright, Scott Coull, F. Monrose (2009)
Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis
Albert Kwon, Henry Corrigan-Gibbs, S. Devadas, B. Ford (2016)
Atom: Horizontally Scaling Strong AnonymityProceedings of the 26th Symposium on Operating Systems Principles
(2010)
Architecture to thwart denial of service attacks, Feb
Jason Franklin, Damon McCoy (2006)
Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting
G. Danezis, Roger Dingledine, Nick Mathewson (2003)
Mixminion: design of a type III anonymous remailer protocol2003 Symposium on Security and Privacy, 2003.
L. Lamport (2001)
Paxos Made Simple
Mehdi Tibouchi (2014)
Elligator Squared: Uniform Points on Elliptic Curves of Prime Order as Uniform Random StringsIACR Cryptol. ePrint Arch., 2014
D. Chaum (1981)
Untraceable electronic mail, return addresses, and digital pseudonyms
Yu-Chun Chang, Kuan-Ta Chen, Chen-Chi Wu, C. Lei (2008)
Inferring Speech Activity from Encrypted Skype TrafficIEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference
Joseph Liu, D. Wong (2005)
Linkable Ring Signatures: Security Models and New Schemes
(2009)
ITU-T G.114 - Amendment 2: New Appendix III – Delay variation on unshared access
Tao Peng, C. Leckie, K. Ramamohanarao (2003)
Protection from distributed denial of service attacks using history-based IP filteringIEEE International Conference on Communications, 2003. ICC '03., 1
Nick Mathewson, Roger Dingledine (2004)
Practical Traffic Analysis: Extending and Resisting Statistical Disclosure
Vijay Srinivasan, J. Stankovic, K. Whitehouse (2008)
Protecting your daily in-home activity information from a wireless snooping attack
D. Monroe (1947)
Privileges and immunities.The Journal of criminal law and criminology, including the American journal of police science, 37 6
Albert Kwon, David Lazar, S. Devadas, B. Ford (2016)
RiffleProceedings on Privacy Enhancing Technologies, 2016
M. Blum, Paul Feldman, S. Micali (2019)
Non-interactive zero-knowledge and its applications
D. Shah (2009)
Gossip AlgorithmsFound. Trends Netw., 3
Ewa Syta, Philipp Jovanovic, Eleftherios Kokoris-Kogias, Nicolas Gailly, Linus Gasser, Ismail Khoffi, M. Fischer, B. Ford (2017)
Scalable Bias-Resistant Distributed Randomness2017 IEEE Symposium on Security and Privacy (SP)
D. Wolinsky, Henry Corrigan-Gibbs, B. Ford, Aaron Johnson (2012)
Dissent in Numbers: Making Strong Anonymity Scale
J. Sankey, M. Wright (2014)
Dovetail: Stronger Anonymity in Next-Generation Internet RoutingArXiv, abs/1405.0351
J. Graaf (2010)
Anonymous One-Time Broadcast Using Non-interactive Dining Cryptographer Nets with Applications to Voting
P. Golle, A. Juels (2004)
Dining Cryptographers Revisited
M. Freedman, R. Morris (2002)
Tarzan: a peer-to-peer anonymizing network layer
Roland Meier, David Gugelmann, L. Vanbever (2017)
iTAP: In-network Traffic Analysis Prevention using Software-Defined NetworksProceedings of the Symposium on SDN Research
M. Reiter, A. Rubin (1998)
Crowds: anonymity for Web transactionsACM Trans. Inf. Syst. Secur., 1
August Reinisch (2016)
Privileges and Immunities
D. Boneh, David Mazières, R. Popa (2011)
Remote Oblivious Storage: Making Oblivious RAM Practical
R. Rivest, A. Shamir, Y. Kalai (2001)
How to Leak a Secret
Andrew Neff (2004)
Verifiable Mixing (Shuffling) of ElGamal Pairs
Xiang Cai, Xin Zhang, Brijesh Joshi, Rob Johnson (2012)
Touching from a distance: website fingerprinting attacks and defensesProceedings of the 2012 ACM conference on Computer and communications security
Kevin Dyer, Scott Coull, T. Ristenpart, Thomas Shrimpton (2012)
Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail2012 IEEE Symposium on Security and Privacy
Sonia Mokhtar, Gautier Berthou, Amadou Diarra, Vivien Quéma, Ali Shoker (2013)
RAC: A Freerider-Resilient, Scalable, Anonymous Communication Protocol2013 IEEE 33rd International Conference on Distributed Computing Systems
Ludovic Barman, Italo Dacosta, M. Zamani, Ennan Zhai, B. Ford, J. Hubaux, J. Feigenbaum (2017)
PriFi: Low-Latency Metadata Protection for Organizational NetworkarXiv: Cryptography and Security
Pablo García, J. Graaf, A. Hevia, Alfredo Viola (2014)
Beating the Birthday Paradox in Dining Cryptographer Networks
R. Skowyra, Kevin Bauer, V. Dedhia, Hamed Okhravi (2016)
Have No PHEAR: Networks Without IdentifiersProceedings of the 2016 ACM Workshop on Moving Target Defense
Henry Corrigan-Gibbs, D. Boneh, David Mazières (2015)
Riposte: An Anonymous Messaging System Handling Millions of Users2015 IEEE Symposium on Security and Privacy
Qiang Xu, Rong Zheng, W. Saad, Zhu Han (2015)
Device Fingerprinting in Wireless Networks: Challenges and OpportunitiesIEEE Communications Surveys & Tutorials, 18
David Lazar, Y. Gilad, N. Zeldovich (2018)
Karaoke: Distributed Private Messaging Immune to Passive Traffic Analysis
Albert Kwon, David Lu, S. Devadas (2019)
XRD: Scalable Messaging System with Cryptographic Privacy
Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, Aniket Kate (2017)
Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency - Choose Two2018 IEEE Symposium on Security and Privacy (SP)
Ludovic Barman, M. Zamani, Italo Dacosta, J. Feigenbaum, B. Ford, J. Hubaux, D. Wolinsky (2016)
PriFi: A Low-Latency and Tracking-Resistant Protocol for Local-Area Anonymous CommunicationProceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society
U. Moeller (2004)
Mixmaster Protocol Version 2
Barbara Raś (2021)
HerdThe Massachusetts Review, 62
Ania Piotrowska, Jamie Hayes, T. Elahi, Sebastian Meiser, G. Danezis (2017)
The Loopix Anonymity SystemArXiv, abs/1703.00536
Stevens Blond, D. Choffnes, William Caldwell, P. Druschel, Nicholas Merritt (2015)
Herd: A Scalable, Traffic Analysis Resistant Anonymity Network for VoIP SystemsProceedings of the 2015 ACM Conference on Special Interest Group on Data Communication
Stevens Blond, A. Cuevas, J. Troncoso-Pastoriza, Philipp Jovanovic, B. Ford, J. Hubaux (2018)
On Enforcing the Digital Immunity of a Large Humanitarian Organization2018 IEEE Symposium on Security and Privacy (SP)
(2009)
114 -Amendment 2: New Appendix III -Delay variation on unshared access lines
A. Krasnova, Moritz Neikes, P. Schwabe (2016)
Footprint Scheduling for Dining-Cryptographer NetworksIACR Cryptol. ePrint Arch., 2015
Tingwei Zhu, D. Feng, Yu Hua, F. Wang, Qingyu Shi, Jiahao Liu (2016)
MIC: An Efficient Anonymous Communication System in Data Center Networks2016 45th International Conference on Parallel Processing (ICPP)
B. Chor, E. Kushilevitz, Oded Goldreich, M. Sudan (1995)
Private information retrievalProceedings of IEEE 36th Annual Foundations of Computer Science
H. Hsiao, T. Kim, A. Perrig, A. Yamada, S. Nelson, M. Gruteser, Wei Meng (2012)
LAP: Lightweight Anonymity and Privacy2012 IEEE Symposium on Security and Privacy
Xun Gong, N. Kiyavash, N. Borisov (2010)
Fingerprinting websites using remote traffic analysis
David Lazar, N. Zeldovich (2016)
Alpenhorn: Bootstrapping Secure Communication without Leaking Metadata
Jeyanthi Hall, M. Barbeau, E. Kranakis (2004)
Enhancing intrusion detection in wireless networks using radio frequency fingerprinting
D. Boneh (1998)
The Decision Diffie-Hellman Problem
(2007)
CRAWDAD dataset pdx/vwave (v
Henry Corrigan-Gibbs, B. Ford (2010)
Dissent: accountable anonymous group messagingArXiv, abs/1004.3057
B. Pfitzmann (1994)
Breaking Efficient Anonymous Channel
(2000)
USENIX Association Proceedings of the
G. Danezis, A. Serjantov (2004)
Statistical Disclosure or Intersection Attacks on Anonymity Systems
Len Sassaman, B. Cohen, Nick Mathewson (2005)
The pynchon gate: a secure method of pseudonymous mail retrieval
(2016)
Ricochet: Anonymous instant messaging for real privacy, 2016
(2016)
Ricochet: Anonymous instant messaging for real privacy
C. Dwork, Aaron Roth (2014)
The Algorithmic Foundations of Differential PrivacyFound. Trends Theor. Comput. Sci., 9
D. Chaum (1988)
The dining cryptographers problem: Unconditional sender and recipient untraceabilityJournal of Cryptology, 1
A. White, Austin Matthews, Kevin Snow, F. Monrose (2011)
Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on Fon-iks2011 IEEE Symposium on Security and Privacy
D. Choong, Chia Cho, C. Tan, R. Lee (2008)
Identifying unique devices through wireless fingerprinting
Chen Chen, D. Asoni, A. Perrig, David Barrera, G. Danezis, C. Troncoso (2018)
TARANET: Traffic-Analysis Resistant Anonymity at the Network Layer2018 IEEE European Symposium on Security and Privacy (EuroS&P)
Satadal Sengupta, Harshit Gupta, Niloy Ganguly, Bivas Mitra, Pradipta De, Sandip Chakraborty (2015)
CRAWDAD dataset iitkgp/apptraffic (v.2015-11-26)CRAWDAD wireless network data archive
Stevens Blond, D. Choffnes, Wenxuan Zhou, P. Druschel, Hitesh Ballani, P. Francis (2013)
Towards efficient traffic-analysis resistant anonymity networksProceedings of the ACM SIGCOMM 2013 conference on SIGCOMM
P. Rogaway (2004)
Nonce-Based Symmetric Encryption
Jelle Hooff, David Lazar, M. Zaharia, N. Zeldovich (2015)
Vuvuzela: scalable private messaging resistant to traffic analysisProceedings of the 25th Symposium on Operating Systems Principles
Ran Dubin, A. Dvir, Ofir Pele, O. Hadar (2016)
I Know What You Saw Last Minute—Encrypted HTTP Adaptive Video Streaming Title ClassificationIEEE Transactions on Information Forensics and Security, 12
A. Panchenko, L. Niessen, Andreas Zinnen, T. Engel (2011)
Website fingerprinting in onion routing based anonymization networksProceedings of the 10th annual ACM workshop on Privacy in the electronic society
D. Wolinsky, Henry Corrigan-Gibbs, B. Ford, Aaron Johnson (2012)
Scalable Anonymous Group Communication in the Anytrust Model
Els Debuf (2015)
Tools to do the job: The ICRC's legal status, privileges and immunitiesInternational Review of the Red Cross, 97
Philipp Winter, T. Pulls, Jürgen Fuß (2013)
ScrambleSuit: a polymorphic network protocol to circumvent censorshipProceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
R. Sheshadri, Dimitrios Koutsonikolas (2017)
On packet loss rates in modern 802.11 networksIEEE INFOCOM 2017 - IEEE Conference on Computer Communications
AbstractOrganizational networks are vulnerable to trafficanalysis attacks that enable adversaries to infer sensitive information fromnetwork traffic—even if encryption is used. Typical anonymous communication networks are tailored to the Internet and are poorly suited for organizational networks.We present PriFi, an anonymous communication protocol for LANs, which protects users against eavesdroppers and provides high-performance traffic-analysis resistance. PriFi builds onDining Cryptographers networks (DC-nets), but reduces the high communication latency of prior designs via a new client/relay/server architecture, in which a client’s packets remain on their usual network path without additional hops, and in which a set of remote servers assist the anonymization process without adding latency. PriFi also solves the challenge of equivocation attacks, which are not addressed by related work, by encrypting traffic based on communication history. Our evaluation shows that PriFi introduces modest latency overhead (≈ 100ms for 100 clients) and is compatible with delay-sensitive applications such as Voice-over-IP.
Proceedings on Privacy Enhancing Technologies – de Gruyter
Published: Oct 1, 2020
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.