On Anonymity Metrics for Practical Anonymous Communication Protocols
スポンサーリンク
概要
- 論文の詳細を見る
Anonymous communication protocols are indispensable to protect users' privacy in open networks such as the Internet. Therefore they have wide application, e.g., electronic voting, and enormous research has been conducted on them. However, since it is difficult to devise general 'anonymity metrics' for practical anonymous protocols such as Crowds, few attempts have been made so far to establish such measures. Therefore, toward anonymity evaluation of practical anonymous networks, first we propose and formalize two novel anonymity metrics for practical anonymous communication networks. Next we shall discuss whether or not deterministic protocols can provide anonymity efficiently in terms of computational complexity. Unfortunately, we can show that it is difficult to build efficient anonymous networks only by means of deterministic approaches. We also run simulation experiments and discuss the results.
- 一般社団法人情報処理学会の論文
- 2004-08-15
著者
-
Miyaji A
School Of Information Science Japan Advanced Institute Of Science And Technology
-
Miyaji Atsuko
School Of Information Science Japan Advanced Institute Of Science And Technology
-
KITAZAWA SHIGEKI
Mitsubishi Electric Corporation Information Technology R&D Center
-
SOSHI MASAKAZU
School of Information Science, Japan Advanced Institute of Science and Technology
-
Soshi M
Japan Advanced Institute Of Science And Technology
-
Kitazawa S
Mitsubishi Electric Corporation Information Technology R&d Center
-
Miyaji Atsuko
School Of Information Science Jaist
-
Kitazawa Shigeki
Mitsubishi Electric Corporation Information Technology R&D Center
関連論文
- Fixed-Hamming-Weight Representation for Indistinguishable Addition Formulae
- On Anonymity Metrics for Practical Anonymous Communication Protocols
- Efficient elliptic curve exponentiation(I)
- The Dynamic-Typed Access Matrix Model and Decidability of the Safety Problem (Applications) (Cryptography and Information Security)
- The Dynamic-Typed Access Matrix Model and Decidability of the Safety Problem
- Java Obfuscation - Approaches to Construct Tamper-Resistant Object-Oriented Programs
- Provably Secure Multi-signature Scheme with Signers' Intentions
- A Timed-Release Proxy Re-Encryption Scheme
- Java Obfuscation Approaches to Construct Tamper-Resistant Object-Oriented Programs
- Java Obfuscation Approaches to Construct Tamper-Resistant Object-Oriented Programs
- Fixed-Hamming-Weight Representation for Indistinguishable Addition Formulae
- Fixed-Hamming-Weight Representation for Indistinguishable Addition Formulae