Duo-Onions and Hydra-Onions - Failure and Adversary Resistant Onion Protocols

A serious weakness of the onion protocol, one of the major tools for anonymous communication, is its vulnerability to network failures and/or an adversary trying to break the communication. This is facilitated by the fact that each message is sent through a path of a certain length and a failure in a single point of this path prohibits message delivery. Since the path cannot be too short in order to offer anonymity protection (at least logarithmic in the number of nodes), the failure probability might be quite substantial.

[1]  Artur Czumaj,et al.  Delayed path coupling and generating random permutations via distributed stochastic processes , 1999, SODA '99.

[2]  Dogan Kesdogan,et al.  Stop-and-Go-MIXes Providing Probabilistic Anonymity in an Open System , 1998, Information Hiding.

[3]  Micah Adler,et al.  Defending anonymous communications against passive logging attacks , 2003, 2003 Symposium on Security and Privacy, 2003..

[4]  David Chaum,et al.  The dining cryptographers problem: Unconditional sender and recipient untraceability , 1988, Journal of Cryptology.

[5]  Paul F. Syverson,et al.  Private Web Browsing , 1997, J. Comput. Secur..

[6]  Hannes Federrath,et al.  Anonymity and Unobservability in the Internet , 1999 .

[7]  Gene Tsudik,et al.  Towards an Analysis of Onion Routing Security , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[8]  Daniel R. Simon,et al.  Cryptographic defense against traffic analysis , 1993, STOC.

[9]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[10]  Noga Alon Testing subgraphs in large graphs , 2002, Random Struct. Algorithms.

[11]  Hannes Federrath,et al.  Project “anonymity and unobservability in the Internet” , 2000, CFP '00.

[12]  Robert Tappan Morris,et al.  Introducing Tarzan, a Peer-to-Peer Anonymizing Network Layer , 2002, IPTPS.

[13]  Paul F. Syverson,et al.  Anonymous connections and onion routing , 1998, IEEE J. Sel. Areas Commun..

[14]  Amos Fiat,et al.  Provable Unlinkability against Traffic Analysis , 2004, Financial Cryptography.

[15]  Marek Klonowski,et al.  Provable Unlinkability Against Traffic Analysis Already After O(log(n)) Steps! , 2004, ISC.