Riposte: An Anonymous Messaging System Handling Millions of Users
@article{CorriganGibbs2015RiposteAA, title={Riposte: An Anonymous Messaging System Handling Millions of Users}, author={Henry Corrigan-Gibbs and Dan Boneh and David Mazi{\`e}res}, journal={2015 IEEE Symposium on Security and Privacy}, year={2015}, pages={321-338} }
This paper presents Riposte, a new system for anonymous broadcast messaging. Riposte is the first such system, to our knowledge, that simultaneously protects against traffic-analysis attacks, prevents anonymous denial-of-service by malicious clients, and scales to million-user anonymity sets. To achieve these properties, Riposte makes novel use of techniques used in systems for private information retrieval and secure multi-party computation. For latency-tolerant workloads with many more…
170 Citations
Metadata-Conscious Anonymous Messaging
- Computer ScienceIEEE Transactions on Signal and Information Processing over Networks
- 2016
This work proves that the performance of a message propagation protocol called adaptive diffusion achieves asymptotically optimal source-hiding and significantly outperforms standard diffusion and demonstrates empirically that adaptive diffusion hides the source effectively on real social graphs.
Two Cents for Strong Anonymity: The Anonymous Post-office Protocol
- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2016
The Anonymous Post-Office Protocol is introduced, a practical strongly-anonymous messaging system that offers strong anonymity against strong, globally-eavesdropping adversaries, that may also control multiple servers, including all-but-one servers in a mix-cascade.
Stadium: A Distributed Metadata-Private Messaging System
- Computer ScienceIACR Cryptol. ePrint Arch.
- 2016
Stadium is presented, a point-to-point messaging system that provides metadata and data privacy while scaling its work efficiently across hundreds of low-cost providers operated by different organizations and achieves its provable guarantees through differential privacy and the addition of noisy cover traffic.
Atom: Horizontally Scaling Strong Anonymity
- Computer ScienceSOSP
- 2017
It is shown that, on a heterogeneous network of 1,024 servers, Atom can transit a million Tweet-length messages in 28 minutes, over 23x faster than prior systems with similar privacy guarantees.
Atom: Scalable Anonymity Resistant to Traffic Analysis
- Computer ScienceArXiv
- 2016
Evaluating Atom on a distributed network of 1,024 dual-core servers is evaluated and it is demonstrated that the system can anonymize more than a million Tweet-length messages with less than 30 minutes of latency.
MCMix: Anonymous Messaging via Secure Multiparty Computation
- Computer Science, MathematicsUSENIX Security Symposium
- 2017
MCMix is presented, an anonymous messaging system that completely hides communication metadata and can scale in the order of hundreds of thousands of users, illustrating how MPC is a viable and competitive alternative to mix-nets and DC-nets for anonymous communication.
PriFi: A Low-Latency Local-Area Anonymous Communication Network
- Computer ScienceArXiv
- 2017
PriFi is presented, the first practical protocol for anonymous communication in local-area networks that is provably secure against traffic-analysis attacks, has a low communication latency, and is traffic agnostic, and can be used in practice with minimal latency overhead.
PriFi: Low-Latency Anonymity for Organizational Networks
- Computer ScienceProc. Priv. Enhancing Technol.
- 2020
PriFi is presented, an anonymous communication protocol for LANs, which protects users against eavesdroppers and provides high-performance traffic-analysis resistance, and solves the challenge of equivocation attacks by encrypting traffic based on communication history.
Riffle: An Efficient Communication System With Strong Anonymity
- Computer ScienceProc. Priv. Enhancing Technol.
- 2016
Riffle consists of a small set of anonymity servers and a large number of users, and guarantees anonymity among all honest clients as long as there exists at least one honest server, a bandwidth and computation efficient communication system with strong anonymity.
XRD: Scalable Messaging System with Cryptographic Privacy
- Computer Science, MathematicsNSDI
- 2020
XRD is presented, a metadata private messaging system that provides cryptographic privacy, while scaling easily to support more users by adding more servers, and uses a novel technique the authors call aggregate hybrid shuffle.
References
SHOWING 1-10 OF 140 REFERENCES
Herbivore: A Scalable and Efficient Protocol for Anonymous Communication
- Computer Science
- 2003
Herbivore is described, a peer-to-peer, scalable, tamper-resilient communication system that provides provable anonymity and privacy and simultaneously provides high efficiency and scalability, distinguishing it from other anonymous communication protocols.
Crowds: anonymity for Web transactions
- Computer ScienceTSEC
- 1998
The design, implementation, security, performance, and scalability of the Crowds system for protecting users' anonymity on the world-wide-web are described and degrees of anonymity as an important tool for describing and proving anonymity properties are introduced.
Low-cost traffic analysis of Tor
- Computer Science2005 IEEE Symposium on Security and Privacy (S&P'05)
- 2005
New traffic-analysis techniques are presented that allow adversaries with only a partial view of the network to infer which nodes are being used to relay the anonymous streams and therefore greatly reduce the anonymity provided by Tor, and it is shown that otherwise unrelated streams can be linked back to the same initiator.
Mixminion: design of a type III anonymous remailer protocol
- Computer Science2003 Symposium on Security and Privacy, 2003.
- 2003
Mixminion works in a real-world Internet environment, requires little synchronization or coordination between nodes, and protects against known anonymity-breaking attacks as well as or better than other systems with similar design parameters.
Dissent: accountable anonymous group messaging
- Computer ScienceCCS '10
- 2010
The protocol preserves message integrity and one-to-one correspondence between members and messages, makes denial-of-service attacks by members traceable to the culprit, and efficiently handles large, unbalanced message loads.
Tor: The Second-Generation Onion Router
- Computer ScienceUSENIX Security Symposium
- 2004
This second-generation Onion Routing system addresses limitations in the original design by adding perfect forward secrecy, congestion control, directory servers, integrity checking, configurable exit policies, and a practical design for location-hidden services via rendezvous points.
Dissent in Numbers: Making Strong Anonymity Scale
- Computer ScienceOSDI
- 2012
Novel techniques are developed in Dissent, a practical group anonymity system, to increase by over two orders of magnitude the scalability of strong, traffic analysis resistant approaches.
Limits of Anonymity in Open Environments
- Computer ScienceInformation Hiding
- 2002
This paper presents a model where one can determine the protection limit of an anonymity technique, i.e. the number of observations required for an attacker to "break" uniquely a given anonymity technique.
Proactively Accountable Anonymous Messaging in Verdict
- Computer ScienceUSENIX Security Symposium
- 2013
Verdict is presented, the first practical anonymous group communication system built using proactively verifiable DC-nets: participants use public-key cryptography to construct DC-net ciphertexts, and use zero-knowledge proofs of knowledge to detect and exclude misbehavior before disruption.
Tarzan: a peer-to-peer anonymizing network layer
- Computer ScienceCCS '02
- 2002
Measurements show that Tarzan imposes minimal overhead over a corresponding non-anonymous overlay route, and Protocols toward unbiased peer-selection offer new directions for distributing trust among untrusted entities.