<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>http://en.zaoniao.it/index.php?action=history&amp;feed=atom&amp;title=Degree_of_anonymity</id>
	<title>Degree of anonymity - Revision history</title>
	<link rel="self" type="application/atom+xml" href="http://en.zaoniao.it/index.php?action=history&amp;feed=atom&amp;title=Degree_of_anonymity"/>
	<link rel="alternate" type="text/html" href="http://en.zaoniao.it/index.php?title=Degree_of_anonymity&amp;action=history"/>
	<updated>2026-05-15T12:43:52Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.32.0</generator>
	<entry>
		<id>http://en.zaoniao.it/index.php?title=Degree_of_anonymity&amp;diff=2617&amp;oldid=prev</id>
		<title>Admin: Created page with &quot;In anonymity networks (e.g., Tor, Crowds, Mixmaster, I2P, etc.), it is important to be able to measure quantitatively the guar...&quot;</title>
		<link rel="alternate" type="text/html" href="http://en.zaoniao.it/index.php?title=Degree_of_anonymity&amp;diff=2617&amp;oldid=prev"/>
		<updated>2019-03-27T06:43:03Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;In &lt;a href=&quot;/index.php?title=Anonymity_network&amp;amp;action=edit&amp;amp;redlink=1&quot; class=&quot;new&quot; title=&quot;Anonymity network (page does not exist)&quot;&gt;anonymity networks&lt;/a&gt; (e.g., &lt;a href=&quot;/Tor&quot; title=&quot;Tor&quot;&gt;Tor&lt;/a&gt;, &lt;a href=&quot;/Crowds&quot; title=&quot;Crowds&quot;&gt;Crowds&lt;/a&gt;, &lt;a href=&quot;/Mixmaster_anonymous_remailer&quot; title=&quot;Mixmaster anonymous remailer&quot;&gt;Mixmaster&lt;/a&gt;, &lt;a href=&quot;/I2P&quot; title=&quot;I2P&quot;&gt;I2P&lt;/a&gt;, etc.), it is important to be able to measure quantitatively the guar...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;In [[anonymity network]]s (e.g., [[Tor]], [[Crowds]], [[Mixmaster anonymous remailer|Mixmaster]], [[I2P]], etc.), it is important to be able to measure quantitatively the guarantee that is given to the system. The '''degree of anonymity''' &amp;lt;math&amp;gt;d&amp;lt;/math&amp;gt; is a device that was proposed at the 2002 Privacy Enhancing Technology (PET) conference. There were two papers that put forth the idea of using [[entropy]] as the basis for formally measuring anonymity: &amp;quot;Towards an Information Theoretic Metric for Anonymity&amp;quot;, and &amp;quot;Towards Measuring Anonymity&amp;quot;. The ideas presented are very similar with minor differences in the final definition of &amp;lt;math&amp;gt;d&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
==Background==&lt;br /&gt;
Anonymity networks have been developed and many have introduced methods of proving the anonymity guarantees that are possible, originally with simple [[Mix network|Chaum Mixes]] and Pool Mixes the size of the set of users was seen as the security that the system could provide to a user. This had a number of problems; intuitively if the network is international then it is unlikely that a message that contains only Urdu came from the United States, and vice versa. Information like this and via methods like the [[Onion Routing|predecessor attack]] and [[Onion Routing|intersection attack]] helps an attacker increase the probability that a user sent the message.&lt;br /&gt;
&lt;br /&gt;
===Example With Pool Mixes===&lt;br /&gt;
As an example consider the network shown above, in here &amp;lt;math&amp;gt;A, B, C&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;D&amp;lt;/math&amp;gt; are users (senders), &amp;lt;math&amp;gt;Q, R, S&amp;lt;/math&amp;gt;, and &amp;lt;math&amp;gt;T&amp;lt;/math&amp;gt; are servers (receivers), the boxes are mixes, and &amp;lt;math&amp;gt;\{A, B\} \in T&amp;lt;/math&amp;gt;, &amp;lt;math&amp;gt;\{A, B, C\} \in S&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;\{A, B, C, D\} \in Q, R&amp;lt;/math&amp;gt; where &amp;lt;math&amp;gt;\in&amp;lt;/math&amp;gt; denotes the anonymity set. Now as there are [[pool mix]]es let the cap on the number of incoming messages to wait before sending be &amp;lt;math&amp;gt;2&amp;lt;/math&amp;gt;; as such if &amp;lt;math&amp;gt;A, B&amp;lt;/math&amp;gt;, or &amp;lt;math&amp;gt;C&amp;lt;/math&amp;gt; is communicating with &amp;lt;math&amp;gt;R&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;S&amp;lt;/math&amp;gt; receives a message then &amp;lt;math&amp;gt;S&amp;lt;/math&amp;gt; knows that it must have come from ??&amp;lt;math&amp;gt;E&amp;lt;/math&amp;gt;?? (as the links between the mixes can only have &amp;lt;math&amp;gt;1&amp;lt;/math&amp;gt; message at a time). This is in no way reflected in &amp;lt;math&amp;gt;S&amp;lt;/math&amp;gt;'s anonymity set, but should be taken into account in the analysis of the network.&lt;br /&gt;
&lt;br /&gt;
==Degree of Anonymity==&lt;br /&gt;
The degree of anonymity takes into account the probability associated with each user, it begins by defining the [[entropy]] of the system (here is where the papers differ slightly but only with notation, we will use the notation from .): &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;math&amp;gt;H(X) := \sum_{i=1}^{N} \left[p_i \cdot \lg\left(\frac{1}{p_i}\right)\right]&amp;lt;/math&amp;gt;,&lt;br /&gt;
where &amp;lt;math&amp;gt;H(X)&amp;lt;/math&amp;gt; is the entropy of the network, &amp;lt;math&amp;gt;N&amp;lt;/math&amp;gt; is the number of nodes in the network, and &amp;lt;math&amp;gt;p_i&amp;lt;/math&amp;gt; is the probability associated with node &amp;lt;math&amp;gt;i&amp;lt;/math&amp;gt;.&lt;br /&gt;
Now the maximal [[entropy]] of a network occurs when there is uniform probability associated with each node &amp;lt;math&amp;gt;\left(\frac{1}{N}\right)&amp;lt;/math&amp;gt; and this yields &amp;lt;math&amp;gt;H_M := H(X) \gets \lg(N)&amp;lt;/math&amp;gt;.&lt;br /&gt;
The degree of anonymity (now the papers differ slightly in the definition here, defines a bounded degree where it is compared to &amp;lt;math&amp;gt;H_M&amp;lt;/math&amp;gt; and gives an unbounded definition—using the entropy directly, we will consider only the bounded case here) is defined as &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;math&amp;gt;d := 1 - \frac{H_M - H(X)}{H_M} = \frac{H(X)}{H_M}&amp;lt;/math&amp;gt;.&lt;br /&gt;
Using this anonymity systems can be compared and evaluated using a quantitatively analysis.&lt;br /&gt;
&lt;br /&gt;
===Definition of Attacker===&lt;br /&gt;
These papers also served to give concise definitions of an attacker:&lt;br /&gt;
; Internal/External : an '''internal''' attacker controls nodes in the network, whereas an '''external''' can only compromise communication channels between nodes.&lt;br /&gt;
; Passive/Active : an '''active''' attacker can add, remove, and modify any messages, whereas a '''passive''' attacker can only listen to the messages.&lt;br /&gt;
; Local/Global : a '''local''' attacker has access to only part of the network, whereas a '''global''' can access the entire network.&lt;br /&gt;
&lt;br /&gt;
==Example &amp;lt;math&amp;gt;d&amp;lt;/math&amp;gt;==&lt;br /&gt;
In the papers there are a number of example calculations of &amp;lt;math&amp;gt;d&amp;lt;/math&amp;gt;; we will walk through some of them here.&lt;br /&gt;
&lt;br /&gt;
===Crowds===&lt;br /&gt;
In [[Crowds]] there is a global probability of forwarding (&amp;lt;math&amp;gt;p_f&amp;lt;/math&amp;gt;), which is the probability a node will forward the message internally instead of routing it to the final destination. Let there be &amp;lt;math&amp;gt;C&amp;lt;/math&amp;gt; corrupt nodes and &amp;lt;math&amp;gt;N&amp;lt;/math&amp;gt; total nodes. In [[Crowds]] the attacker is internal, passive, and local. Trivially &amp;lt;math&amp;gt;H_M \gets \lg (N - C)&amp;lt;/math&amp;gt;, and overall the entropy is &amp;lt;math&amp;gt;H(x) \gets \frac{N - p_f \cdot (N - C - 1) }{N} \cdot \lg\left[\frac{N}{N - p_f \cdot (N - C - 1)}\right] + p_f \cdot \frac{N - C - 1}{N} \cdot \lg\left[N/p_f\right]&amp;lt;/math&amp;gt;, &amp;lt;math&amp;gt;d&amp;lt;/math&amp;gt; is this value divided by &amp;lt;math&amp;gt;H_M&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
===Onion routing===&lt;br /&gt;
In [[onion routing]] let's assume the attacker can exclude a subset of the nodes from the network, then the entropy would easily be &amp;lt;math&amp;gt;H(X) \gets \lg(S)&amp;lt;/math&amp;gt;, where &amp;lt;math&amp;gt;S&amp;lt;/math&amp;gt; is the size of the subset of non-excluded nodes. Under an attack model where a node can both globally listen to message passing and is a node on the path this ''decreases'' to &amp;lt;math&amp;gt;H(X) \gets \lg(L)&amp;lt;/math&amp;gt;, where &amp;lt;math&amp;gt;L&amp;lt;/math&amp;gt; is the length of the onion route (this could be larger or smaller than &amp;lt;math&amp;gt;S&amp;lt;/math&amp;gt;), as there is no attempt in onion routing to remove the correlation between the incoming and outgoing messages.&lt;br /&gt;
&lt;br /&gt;
===Applications of this metric===&lt;br /&gt;
In 2004, Diaz, [[Len Sassaman|Sassaman]], and DeWitte presented an analysis of two anonymous [[remailers]] using the Serjantov and Danezis metric, showing one of them to provide zero anonymity under certain realistic conditions.&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
* [[Onion routing]]&lt;br /&gt;
* [[Tor]]&lt;br /&gt;
* [[Crowds]]&lt;br /&gt;
&lt;br /&gt;
==Source==&lt;br /&gt;
[http://wikipedia.org/ http://wikipedia.org/]&lt;br /&gt;
&lt;br /&gt;
[[Category:Anonymity and security]]&lt;/div&gt;</summary>
		<author><name>Admin</name></author>
		
	</entry>
</feed>