Title | Extending Routes in Tor to Achieve Recipient Anonymity against the Global Adversary |
Publication Type | Conference Paper |
Year of Publication | 2021 |
Authors | Buccafurri, Francesco, De Angelis, Vincenzo, Idone, Maria Francesca, Labrini, Cecilia |
Conference Name | 2021 International Conference on Cyberworlds (CW) |
Keywords | anonymity, anonymous routing, Censorship resistance, composability, Costs, Encryption, Human Behavior, Metrics, Numerical models, overlay networks, privacy, pubcrawl, resilience, Resiliency, Routing, Routing protocols, Topology |
Abstract | Tor is a famous routing overlay network based on the Onion multi-layered encryption to support communication anonymity in a threat model in which some network nodes are malicious. However, Tor does not provide any protection against the global passive adversary. In this threat model, an idea to obtain recipient anonymity, which is enough to have relationship anonymity, is to hide the recipient among a sufficiently large anonymity set. However, this would lead to high latency both in the set-up phase (which has a quadratic cost in the number of involved nodes) and in the successive communication. In this paper, we propose a way to arrange a Tor circuit with a tree-like topology, in which the anonymity set consists of all its nodes, whereas set-up and communication latency depends on the number of the sole branch nodes (which is a small fraction of all the nodes). Basically, the cost goes down from quadratic to linear. Anonymity is obtained by applying a broadcast-based technique for the forward message, and cover traffic (generated by the terminal-chain nodes) plus mixing over branch nodes, for the response. |
DOI | 10.1109/CW52790.2021.00048 |
Citation Key | buccafurri_extending_2021 |