Anonymity and privacy: a guide for the perplexed

Anonymity and privacy are two separate concepts that are often confused. It is a common problem, made worse by the fact that they are often connected and related to each other. Which of them should be used when, and what do they mean? The terms anonymity and privacy are often used interchangeably, even by experienced researchers and academics. In reality, they are entirely different. Danny Bradbury explores the difference between the two concepts, where anonymity is relevant, and how it can be protected. And he finds that, while there are many tools that purport to allow anonymity online, these are constantly under attack, and achieving either privacy or anonymity is no easy task.

[1]  Joseph Y. Halpern,et al.  Knowledge, probability, and adversaries , 1993, JACM.

[2]  Samson Abramsky,et al.  Domain theory , 1995, LICS 1995.

[3]  Michael K. Reiter,et al.  Crowds: anonymity for Web transactions , 1998, TSEC.

[4]  John C. Mitchell,et al.  Probabilistic Polynomial-Time Equivalence and Security Analysis , 1999, World Congress on Formal Methods.

[5]  Benjamin C. Pierce,et al.  Logical relations for encryption , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..

[6]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[7]  Paul F. Syverson,et al.  Anonymous connections and onion routing , 1998, IEEE J. Sel. Areas Commun..

[8]  Rocco De Nicola,et al.  Proof Techniques for Cryptographic Processes , 2001, SIAM J. Comput..

[9]  Joseph E. Stoy,et al.  Denotational Semantics: The Scott-Strachey Approach to Programming Language Theory , 1981 .

[10]  David Chaum,et al.  The dining cryptographers problem: Unconditional sender and recipient untraceability , 1988, Journal of Cryptology.

[11]  Carl A. Gunter Semantics of programming languages: structures and techniques , 1993, Choice Reviews Online.

[12]  Steve A. Schneider,et al.  CSP and Anonymity , 1996, ESORICS.

[13]  Ian Clarke,et al.  Freenet: A Distributed Anonymous Information Storage and Retrieval System , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[14]  Ronald Fagin,et al.  Reasoning about knowledge , 1995 .

[15]  David A. Cooper,et al.  Preserving privacy in a network of mobile computers , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.

[16]  Pierangela Samarati,et al.  Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression , 1998 .

[17]  J. Hintikka Knowledge and belief , 1962 .

[18]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[19]  E. Hughes A cypherpunk's manifesto , 1997 .

[20]  Steve A. Schneider Security properties and CSP , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[21]  Paul F. Syverson,et al.  Group Principals and the Formalization of Anonymity , 1999, World Congress on Formal Methods.

[22]  David A. Wagner,et al.  Privacy-enhancing technologies for the Internet , 1997, Proceedings IEEE COMPCON 97. Digest of Papers.

[23]  Gene Tsudik,et al.  Towards an Analysis of Onion Routing Security , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[24]  Martín Abadi,et al.  Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption) , 2007, Journal of Cryptology.

[25]  Martín Abadi,et al.  Private authentication , 2004, Theor. Comput. Sci..

[26]  Martín Abadi,et al.  A calculus for cryptographic protocols: the spi calculus , 1997, CCS '97.