1) The document discusses the design dilemma of anonymity networks between efficient but non-robust designs versus robust designs with higher costs and computation.
2) It models the strategic behavior of users and adversaries in these networks as non-cooperative and sequential games to analyze the impact on anonymity.
3) The core example analyzed is the Dining Cryptographer network, and game theoretic tools are applied to determine optimal strategies and Nash equilibria between efficient and robust coding schemes and adversary identification abilities.
hashdays 2011: Jean-Philippe Aumasson - Cryptanalysis vs. RealityArea41
Cryptanalysts publish a tremendous number of research articles presenting attacks on ciphers, hash functions, or authentication protocols. However, not all academic attacks pose a threat to the real-world applications where the attacked crypto is deployed. In this talk, we’ll explain why attacks are not always attacks by going through technical subtleties of state-of-the-art cryptanalysis research, which we’ll illustrate with concrete ?eld examples. The topics discussed include related-key attacks, the real security of AES, as well as the role of the human factor.
Bio: Jean-Philippe Aumasson is a cryptographer at Nagravision SA, a world leader in
digital security and conditional access systems. He received a PhD from EPFL in 2009 and authored more than 20 research papers in the ?eld of cryptanalysis. He was co-awarded prizes for his cryptanalysis results, and is the co-inventor of new attacks such as cube testers, zero-sum attacks, tuple attacks, and banana attacks. He is the principal designer of the hash function BLAKE, one of the 5 finalists in NIST’s SHA-3 competition.
Keynote discussion of how classrooms are changing and some practical things that teachers, IT directors, and administrators can do to facilitate this change.
hashdays 2011: Jean-Philippe Aumasson - Cryptanalysis vs. RealityArea41
Cryptanalysts publish a tremendous number of research articles presenting attacks on ciphers, hash functions, or authentication protocols. However, not all academic attacks pose a threat to the real-world applications where the attacked crypto is deployed. In this talk, we’ll explain why attacks are not always attacks by going through technical subtleties of state-of-the-art cryptanalysis research, which we’ll illustrate with concrete ?eld examples. The topics discussed include related-key attacks, the real security of AES, as well as the role of the human factor.
Bio: Jean-Philippe Aumasson is a cryptographer at Nagravision SA, a world leader in
digital security and conditional access systems. He received a PhD from EPFL in 2009 and authored more than 20 research papers in the ?eld of cryptanalysis. He was co-awarded prizes for his cryptanalysis results, and is the co-inventor of new attacks such as cube testers, zero-sum attacks, tuple attacks, and banana attacks. He is the principal designer of the hash function BLAKE, one of the 5 finalists in NIST’s SHA-3 competition.
Keynote discussion of how classrooms are changing and some practical things that teachers, IT directors, and administrators can do to facilitate this change.
HighCloud Security CSA LA and Seattle chapter presentationHighCloud Security
This presentation "Can encryption help alleviate concerns about moving to the cloud?" was presented to the Seattle and LA chapters of the Cloud Security Alliance in Q1 of 2013.
HighCloud CTO Steve Pate talks about the use of encryption and key management in virtualized and cloud environments.
Performance Attacks on Intrusion Detection SystemsDavide Eynard
A presentation of my minor research project at Politecnico di Milano, Dec 2007. It uses a finite queue model to describe IDS performances when subject to a performance attack and shows a practical example with a backtracking algorithmic complexity attack.
an overview of the state of the art of Distributed Denial of Service attacks delivered at Birmingham City University. To avoid copyright problems, I a few slides were removed or heavily edited. Audience was graduate students and academic staff so expect the academic flavour.
Development of a secure routing protocol using game theory model in mobile ad...LogicMindtech Nologies
NS2 Projects for M. Tech, NS2 Projects in Vijayanagar, NS2 Projects in Bangalore, M. Tech Projects in Vijayanagar, M. Tech Projects in Bangalore, NS2 IEEE projects in Bangalore, IEEE 2015 NS2 Projects, WSN and MANET Projects, WSN and MANET Projects in Bangalore, WSN and MANET Projects in Vijayangar
Development of a secure routing protocol using game theory model in mobile ad...LogicMindtech Nologies
NS2 Projects for M. Tech, NS2 Projects in Vijayanagar, NS2 Projects in Bangalore, M. Tech Projects in Vijayanagar, M. Tech Projects in Bangalore, NS2 IEEE projects in Bangalore, IEEE 2015 NS2 Projects, WSN and MANET Projects, WSN and MANET Projects in Bangalore, WSN and MANET Projects in Vijayangar
Networked Dynamic Systems: Identification, Controllability, and RandomnessMarzieh Nabi
As part of my research, we aimed to develop a graph-centric framework for the analysis and synthesis of networked dynamic systems (NDS) consisting of multiple dynamic units that interact via an interconnection topology. We examined three categories of network problems, namely, identification, controllability, and randomness. In network identification, we made explicit relation between the input-output behavior of a NDS
and the underlying interacting network.
In network controllability, we provided structural and algebraic insights into features of the network that enable external signal(s) to control the state of the nodes in the network for certain classes of networks, namely, path, circulant, and Cartesian networks. We also examined the relation between network controllability and the symmetry structure
of the graph.
Motivated by the analysis results for the controllability and observability of deterministic networks, a natural question is whether randomness in the network layer or in the layer of inputs and outputs generically lead to favorable system theoretic properties.
In this direction, we examined system theoretic properties of random networks including controllability, observability, performance of optimal feedback controller, and estimator design. We explored some of the ramifications of such an analysis framework in opinion dynamics over social networks and also sensor networks to estimate the position of a Seaglider in real-time from experimental data with intermittent observations.
Secure Cloud Hosting: Real Requirements to Protect your DataArmor
FireHost's Senior Security Engineer will discuss the need for acute awareness to secure data in the Cloud, and how the advancement of the environment has also accelerated the way this technology can be breached. The session will also include case studies on attacks and what you need to be asking yourself and your provider.
DNS security is important. But, in today’s world of dynamic cloud environments (AWS and Azure), content delivery networks (CDNs) and crowdsourced content and advertisements, looking only at the domain name is not a complete indicator of security. “Grey” domains are no longer the exception, they have become the norm. Join this webcast to explore the risks of relying on DNS-only based solutions and ways to add security to your DNS traffic without sacrificing performance or additional security insights.
HighCloud Security CSA LA and Seattle chapter presentationHighCloud Security
This presentation "Can encryption help alleviate concerns about moving to the cloud?" was presented to the Seattle and LA chapters of the Cloud Security Alliance in Q1 of 2013.
HighCloud CTO Steve Pate talks about the use of encryption and key management in virtualized and cloud environments.
Performance Attacks on Intrusion Detection SystemsDavide Eynard
A presentation of my minor research project at Politecnico di Milano, Dec 2007. It uses a finite queue model to describe IDS performances when subject to a performance attack and shows a practical example with a backtracking algorithmic complexity attack.
an overview of the state of the art of Distributed Denial of Service attacks delivered at Birmingham City University. To avoid copyright problems, I a few slides were removed or heavily edited. Audience was graduate students and academic staff so expect the academic flavour.
Development of a secure routing protocol using game theory model in mobile ad...LogicMindtech Nologies
NS2 Projects for M. Tech, NS2 Projects in Vijayanagar, NS2 Projects in Bangalore, M. Tech Projects in Vijayanagar, M. Tech Projects in Bangalore, NS2 IEEE projects in Bangalore, IEEE 2015 NS2 Projects, WSN and MANET Projects, WSN and MANET Projects in Bangalore, WSN and MANET Projects in Vijayangar
Development of a secure routing protocol using game theory model in mobile ad...LogicMindtech Nologies
NS2 Projects for M. Tech, NS2 Projects in Vijayanagar, NS2 Projects in Bangalore, M. Tech Projects in Vijayanagar, M. Tech Projects in Bangalore, NS2 IEEE projects in Bangalore, IEEE 2015 NS2 Projects, WSN and MANET Projects, WSN and MANET Projects in Bangalore, WSN and MANET Projects in Vijayangar
Networked Dynamic Systems: Identification, Controllability, and RandomnessMarzieh Nabi
As part of my research, we aimed to develop a graph-centric framework for the analysis and synthesis of networked dynamic systems (NDS) consisting of multiple dynamic units that interact via an interconnection topology. We examined three categories of network problems, namely, identification, controllability, and randomness. In network identification, we made explicit relation between the input-output behavior of a NDS
and the underlying interacting network.
In network controllability, we provided structural and algebraic insights into features of the network that enable external signal(s) to control the state of the nodes in the network for certain classes of networks, namely, path, circulant, and Cartesian networks. We also examined the relation between network controllability and the symmetry structure
of the graph.
Motivated by the analysis results for the controllability and observability of deterministic networks, a natural question is whether randomness in the network layer or in the layer of inputs and outputs generically lead to favorable system theoretic properties.
In this direction, we examined system theoretic properties of random networks including controllability, observability, performance of optimal feedback controller, and estimator design. We explored some of the ramifications of such an analysis framework in opinion dynamics over social networks and also sensor networks to estimate the position of a Seaglider in real-time from experimental data with intermittent observations.
Secure Cloud Hosting: Real Requirements to Protect your DataArmor
FireHost's Senior Security Engineer will discuss the need for acute awareness to secure data in the Cloud, and how the advancement of the environment has also accelerated the way this technology can be breached. The session will also include case studies on attacks and what you need to be asking yourself and your provider.
DNS security is important. But, in today’s world of dynamic cloud environments (AWS and Azure), content delivery networks (CDNs) and crowdsourced content and advertisements, looking only at the domain name is not a complete indicator of security. “Grey” domains are no longer the exception, they have become the norm. Join this webcast to explore the risks of relying on DNS-only based solutions and ways to add security to your DNS traffic without sacrificing performance or additional security insights.
Similar to On the Design Dilemma in Dining Cryptographer Networks (20)
Smartphone Applications - Common Criteria is going MobileJens Oberender
Smartphones are a growing, fast moving field of IT. Although smartphones and their applications are omnipresent and potentially violating security, its development cycle is not yet tackled by application evaluation thoroughly.
International Common Criteria Conference, Paris, France. September 18-20, 2012.
Pitch Your Project and Vision – Zielgerichtete KommunikationJens Oberender
SIGINT2012 talk - konzeptbotschafter.de -
Bring es auf den Punkt, was Dein Projekt und Deine Vision ausmacht! In jedem Fall ist zielgerichtete Kommunikation notwendig: erfülle präzise die Bedürfnisse Deiner Community. Visionen und Ziele müssen effizient kommuniziert werden.
Thirty seconds to speak and to impress. Are you ready to take your chance if Bill Gates listens to your idea? Do you convert into success?
This workshop tells you how to prepare your elevator pitch, a 30-second talk that gets your point across quickly. It is currently hyped for business acquisition, but the principles covered in this workshop will also help to get a new job, impress your boss and attracting your significant other.
Workshop by Jens Oberender, CC for TLI 2012 D59 K4
Algorithm for Multi-Path Hop-By-Hop RoutingJens Oberender
The next generation internet provides resilient wide area networking. Resilience is the ability to resist outer influences such as link failures. During routing protocols reorganize the communication paths after a topology change, data loss can occur. Using multiple paths, network operation can continue after failure detection.
This work examines Multi-Path Hop-by-Hop routing where any single link failure can be locally recovered. We produce acyclic routing graphs for destination-based routing. Our approach results in two edge sets: active and reserve links. Active edges provide an acyclic graph embedding a spanning tree. Any failure that is not covered by redundant active edges is recovered by inserting a reserve edge. We guarantee recovery of the first link failure event and then seamlessly restore a HammockSet for the new topology.
Two similar approaches have been published. The O2-algorithm derived out of the project ”Key Components for the Mobile Internet of Next Generation” [Sch01] and constructs thin Hammock-Sets but is restricted to certain topologies. The MPA-algorithm [Nar00] succeeds on any topology, yet it cannot provide redundancy to all nodes. We specify topologies that allow stand-by recovery to all nodes and destinations, while we construct edge-maximized HammockSets.
For evaluation we introduce link significance, a measure for the forwarding function of inner HammockSet nodes. A heuristic algorithm optimizes the HammockSet layout for traffic distribution. It restricts the number of HammockSets on one network edge, increasing the bandwidth fraction available to the participating HammockSets.
A prototype implementation has been part of this work. It constructs HammockSets for any
destination node of a topology. The final chapter discusses the feasibility of implementing our approach in real-world systems. Further, we point out possibilities for future work.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
On the Design Dilemma in Dining Cryptographer Networks
1. TrustBus 2008
Turin, Italy
5. September 2008
On the Design Dilemma in Dining
Cryptographer Networks
Institute for IT-Security and Security Law
Jens Oberender
Computer Networks & Communications Group
Hermann de Meer
University of Passau
Germany
partly supported by
EuroNGI Design and Engineering of the Next Generation Internet (IST-028022)
EuroNF Anticipating the Network of the Future (IST-216366)
2. Motivation
Connection-level anonymity
Establish communication privacy
Hides relationship between initiator and receiver of a message
Being undistinguishable within the anonymity set
Anonymity evolves in a non-cooperative game
Strategies := cooperate | defect
Node strategies -> anonymity set -> anonymity grade
Nash equilibria indicate best strategy
Does rational behavior have impact on the anonymity?
How can rationality protect reachability?
On the Design Dilemma in DC-nets 2
3. Overview
Does rational behavior have impact on the anonymity?
1) Modeling rational behavior
2) Taxonomy of anonymity techniques
3) Accessible information in Dining Cryptographer (DC) networks
How can rationality protect availability?
4) Parameterizing games during design
On the Design Dilemma in DC-nets 3
4. Rational acting in Anonymity
Networks
1. What benefit is received ? 2. What cost is involved in
participation?
Sender anonymity
Effective Throughput
Anonymity set
enhances Increase of message delay
grade of anonymity Increase of traffic
on purpose to
counter traffic
Challenges for design of anonymity systems analysis
Impact of strategic behavior on anonymity
Novel attacks targeting economy of anonymity
On the Design Dilemma in DC-nets 4
5. Requirements of strategic behavior in
anonymity networks
Enable senders to determine anonymity
1) Rely on trustworthy entities
No abuse of collected system-wide entropy
Trust into computing anonymity grade
2) Neighborhood–based approaches (first-hand experience)
Limited credibility – eclipse attack
Anonymity grade in near future
1) Based on prediction
2) Policy enforced
On the Design Dilemma in DC-nets 5
6. Determine anonymity grade
Strategic users consider anonymity of a message in advance
Decentralization: limited system view
Predicted Depdendable
Without
Perceived anonymity Assured anonymity
Pre-
• broadcast responses in a DC-net • queue state in a mixer node
requisites
Relies Reported anonymity Policy-enforced anonymity
• reported number of participants • mixer policy in high-latency
on
Trust e.g. AN.ON mixers, no forwarding,
before anonymity guaranteed
On the Design Dilemma in DC-nets 6
7. Dining Cryptographer (DC) networks
Round-based
Sender broadcasts
message or empty packet
Disruption: message collisions
require retransmission
Security objective: reachability
Coding schemes
Cost in bandwidth, computation effort
Robustness against collisions
Countermeasure to disrupters
On the Design Dilemma in DC-nets 7
8. Apply game theory to Dining Efficient / Robust design
Designer
Cryptographer (DC) networks User Participate / Leave
Adversary Conforming / Disrupt
Design dilemma: efficient or robust
Non-cooperative game Sequential game
Complete Information Incomplete information
Payoff functions public Adversaries strategy unknown
Imperfect information Perfect information
Concurrency Time order
Random disruptions
Disrupter identification removes attacker from network
Disrupt without being identified as disrupter
Rational behavior, possible to formulate as utility function
On the Design Dilemma in DC-nets 8
9. Resolving dilemma games
Iterated Prisoner’s Dilemma (IPD) -> Mixed strategy solution
Nash Equilibria in iterated games
1
Probability distributions
0.8
Disrupt probability
Non-cooperative
Different strategies
0.6
p>80% disrupting
0.4
in non-cooperative game
0.2
Ability to identify disrupters (>18%)
Sequential
0
prevents misbehavior in sequential game
0 0.2 0.4 0.6 0.8 1
Ability to identify disrupter
User’s preference for anonymity
On the Design Dilemma in DC-nets 9
10. Conclusions
Modeling of strategic behavior
Grade of anonymity relies on behavior of all participants
For design of anonymity systems
Risk-prevention of malicious participants
Dilemma games
Influence rational players through system parameters
Incomplete knowledge restrict the designer’s payoff,
but parameters hinder malicious collisions
User perspective on future anonymity:
more research ongoing
On the Design Dilemma in DC-nets 10
11. DC Coding Schemes
Bitwise XOR [Chaum88]
Not robust against collisions
Low computation overhead
Bilinear Maps [Golle04]
Robust against collisions
Medium computation overhead
Identification of Disrupters [Bos89]
Robust against collisions
High computation overhead
Identifies a disrupter
On the Design Dilemma in DC-nets 11
12. Dining Cryptographers network
Figure out, whether the meal has been paid
by either one at the table
Protocol provides sender anonymity
13. Communication Anonymity
Anonymity := do not disclose communication relationship
between sender and recipient
Technically: being indistinguishable within the anonymity set,
i.e. all current communication participants
Level of anonymity scales with size of anonymity set
If a user leaves system degrades anonymity
Especially in small systems
DC net
Coding superimposes messages
Simultaneous slot occupation
communication is disrupted
Effort to receive/decode broadcasts
On the Design Dilemma in DC-nets 13
14. Game Theory and Dilemmas
Models strategic behavior, e.g. in cooperative systems
Game defines players, strategy sets, and utility
Outcome defined by strategies of all users
Pay off: effective utility depending on the outcome of the game
Strategic behavior
Rationally acting, i.e. maximize payoff
Predict strategy of other players (Non-cooperative game)
Minimize own losses (Sequential game, incomplete knowledge)
Dilemma: strategic behavior
does not increase payoff for any of the players
On the Design Dilemma in DC-nets 14
15. Stake holders of a DC-net
Send M1
Dining Cryptographers network
Broadcast
Send M2 Send M3
Communicating subjects (=users)
Anonymous communication with reasonable cost
Adversary
Disrupt anonymous communications (increase user costs),
but remain unidentified
DC-net designer
Facilitate high level of anonymity
Decreasing participation degrades anonymity (for small sizes)
On the Design Dilemma in DC-nets 15
16. 1) Robust design
against malicious attacks
Design parameters
α 0 none – collision robustness
1 full
Designer Strategy s 1
1
β 0 no –disrupter identification
0.8
1 possible
0.6 Sequential
User (single instance)
0.4 Non-Coop.
γ 0 low – anonymity preference =0
0.2
1 high >0
0
0 0.2 0.4 0.6 0.8 1
Compute Nash equilibria , i.e. best strategy for specified parameters
Probability for efficient (0) or robust (1) algorithm
On the Design Dilemma in DC-nets 16
17. References
Pfitzmann, A., Hansen, M.: Anonymity, unlinkability, undetectability,
unobservability, pseudonymity, and identity management - a consolidated
proposal for terminology. (2008) Draft
Dingledine, R., Mathewson, N.: Anonymity loves company: Usability and
the network effect. In: Workshop on the Economics of Information
Security. (2006)
Acquisti, A., Dingledine, R., Syverson, P.: On the economics of anonymity.
In Financial Cryptography. Number 2742 in LNCS, Springer (2003)
Golle, P., Juels, A.: Dining cryptographers revisited. In: EUROCRYPT.
Volume 3027 of LNCS, Springer (2004) 456-473
Bos, J.N., den Boer, B.: Detection of Disrupters in the DC Protocol. In:
Workshop on the theory and application of cryptographic techniques on
Advances in cryptology. (1989) 320-327
On the Design Dilemma in DC-nets 17