论文标题

一项有关匿名通信系统的调查,专注于餐饮密码师网络

A Survey on Anonymous Communication Systems with a Focus on Dining Cryptographers Networks

论文作者

Shirali, Mohsen, Tefke, Tobias, Staudemeyer, Ralf C., Poehls, Henrich C.

论文摘要

流量分析攻击可以抵消端到端加密,并使用泄漏的通信元数据来揭示有关交流方的信息。随着数量不断增加的网络设备不断增加的流量,通信隐私受到破坏。因此,提出了匿名通信系统(ACS)来隐藏传输消息及其发件人和接收器之间的关系,从而提供称为匿名性,无键和不可观念性的隐私属性。本文旨在审查ACSS领域的研究,重点是餐饮密码师网络(DCNS)。基于DCN的方法在理论上是信息安全的,因此提供无条件的不可观察性保证。最初,他们对匿名通信的采用受到了阻碍,因为当时他们的计算和通信开销很大,并且发生了可伸缩性问题。但是,最近的贡献,例如传输任意长度,有效的破坏处理和间接改进的消息的可能性,使现代基于DCN的方法的整合变得更加现实。此外,文献并不遵循隐私属性的共同定义,因此很难比较方法的收益。因此,这项调查有助于引入ACS隐私属性的统一术语,然后概述ACS的基本原理,尤其是基于DCN的方法,最后研究了它们与新的协调隐私术语的一致性。先前的调查并未涵盖ACS领域的最新研究进展,也没有关注基于DCN的方法。我们的全面调查通过提供视觉图来突出隐私属性并讨论使DCN适用于资源约束环境的最有希望的想法,从而缩小了这一差距。

Traffic analysis attacks can counteract end-to-end encryption and use leaked communication metadata to reveal information about communicating parties. With an ever-increasing amount of traffic by an ever-increasing number of networked devices, communication privacy is undermined. Therefore, Anonymous Communication Systems (ACSs) are proposed to hide the relationship between transmitted messages and their senders and receivers, providing privacy properties known as anonymity, unlinkability, and unobservability. This article aims to review research in the ACSs field, focusing on Dining Cryptographers Networks (DCNs). The DCN-based methods are information-theoretically secure and thus provide unconditional unobservability guarantees. Their adoption for anonymous communications was initially hindered because their computational and communication overhead was deemed significant at that time, and scalability problems occurred. However, more recent contributions, such as the possibility to transmit messages of arbitrary length, efficient disruption handling and overhead improvements, have made the integration of modern DCN-based methods more realistic. In addition, the literature does not follow a common definition for privacy properties, making it hard to compare the approaches' gains. Therefore, this survey contributes to introducing a harmonized terminology for ACS privacy properties, then presents an overview of the underlying principles of ACSs, in particular, DCN-based methods, and finally, investigates their alignment with the new harmonized privacy terminologies. Previous surveys did not cover the most recent research advances in the ACS area or focus on DCN-based methods. Our comprehensive investigation closes this gap by providing visual maps to highlight privacy properties and discussing the most promising ideas for making DCNs applicable in resource-constrained environments.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源