• DocumentCode
    2129759
  • Title

    Shared Crowds: A Token-Ring Approach to Hide the Receiver

  • Author

    Wigoutschnigg, Raphael ; Schartner, Peter ; Rass, S.

  • Author_Institution
    Inst. of Appl. Inf., Alpen-Adria Univ. Klagenfurt, Klagenfurt, Austria
  • fYear
    2013
  • fDate
    2-6 Sept. 2013
  • Firstpage
    383
  • Lastpage
    389
  • Abstract
    Because of the intensive usage of the internet and services provided over the world wide web, the privacy of the users is threatened by various attacks. This paper shows how to build a protocol for anonymous data transmission, with the primary focus on hiding the identity of the receiver (receiver anonymity), using multi path transmission and secret sharing. This protocol extends the crowds system by Reiter and Rubin, which only weakly hides the identity of the receiver. Due to the use of a circular channel topology the receiver is hidden even if timing attacks are mounted. Additionally this protocol gives the participating nodes the possibility to detect active attacks during the channel setup phase. Another positive aspect is the ability to handle some kind of node failures by repairing the virtual channel.
  • Keywords
    security of data; active attack detection; anonymous data transmission; channel setup phase; circular channel topology; multipath transmission; node failures; receiver anonymity; receiver identity hiding; secret sharing; shared crowds; token-ring approach; virtual channel repair; Encryption; Protocols; Receivers; Routing; Timing; Anonymity; Crowds; Multi-Path-Transmission; Secret-Sharing; Semantic-Security;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Availability, Reliability and Security (ARES), 2013 Eighth International Conference on
  • Conference_Location
    Regensburg
  • Type

    conf

  • DOI
    10.1109/ARES.2013.51
  • Filename
    6657267