gap - Practical Anonymous Networking

@inproceedings{Bennett2003gapP,
  title={gap - Practical Anonymous Networking},
  author={Krista Bennett and Christian Grothoff},
  booktitle={Privacy Enhancing Technologies},
  year={2003}
}
This paper describes how anonymity is achieved in gnunet, a framework for anonymous distributed and secure networking. 
Systems for Anonymous Communication
We present an overview of the eld of anonymous communications, from its establishment in 1981 by David Chaum to today. Key systems are presented categorized according to their underlying principles:
Communication Setup in Anonymous Messaging
In anonymous group messaging any group member may wish to send a message anonymously to the other members, and all members follow a defined protocol. Not all members can be trusted, meaning that some
A Survey of Anonymous Communication Channels
TLDR
An overview of the field of anonymous communications, from its establishment in 1981 from David Chaum to today, is presented, including extended discussions of the threat models and usage models that different schemes provide, and the trade-offs between the security properties offered and the communication characteristics different systems support.
The Free Secure Network Systems Group: Secure Peer-to-Peer Networking and Beyond
  • C. Grothoff
  • Computer Science
    2011 First SysSec Workshop
  • 2011
TLDR
The current research and future plans of the Free Secure Network Systems Group at the Technische Universitaet Muenchen are introduced and some insight into the development process and architecture of the GNU net P2P framework is provided.
Query Forwarding Algorithm Supporting Initiator Anonymity in GNUnet
TLDR
An alternative routing protocol applicable in GNUnet is proposed, which is resistant to Kugler's shortcut attacks and points out traceability of initiator.
Holistic confidentiality in open networks
TLDR
This work was created with the help and support of many helpful and kind people and would like to thank my wife for her endless patience.
Survey on Anonymity in Unstructured Peer-to-Peer Systems
  • Renyi Xiao
  • Computer Science
    Journal of Computer Science and Technology
  • 2008
TLDR
The properties of unstructured P2P anonymity are investigated, and current attack models on these designs are summarized, to discuss the open problems in this field and propose several future research directions.
An Analysis of GNUnet and the Implications for Anonymous, Censorship-Resistant Networks
  • D. Kügler
  • Computer Science
    Privacy Enhancing Technologies
  • 2003
TLDR
GNUnet’s performance-enhancing features can be exploited to determine the initiator of a download and an efficient filter mechanism for GNUnet is presented.
A Study on Anonymous P2P Networks and their Vulnerabilities
TLDR
This thesis work is a study of various existing P2P networks and also about the attacks on these networks, discussing various anonymous mechanisms like crowds, mixes, onion routing, and antnet routing.
A Survey on Routing in Anonymous Communication Protocols
TLDR
This work surveys previous research on designing, developing, and deploying systems for anonymous communication and provides important insights about the differences between the existing classes of anonymous communication protocols.
...
...

References

SHOWING 1-10 OF 28 REFERENCES
A Protocol for Scalable Anonymous Communication
TLDR
A novel feature of (Peer-to-Peer Personal Privacy Protocol) is that it allows individual participants to trade-off degree of anonymity for communication efficiency, and hence can be used to scalably implement large anonymous groups.
P5: A protocol for scalable anonymous communication
TLDR
A novel feature of P5 is that it allows individual participants to trade-off degree of anonymity for communication efficiency, and hence can be used to scalably implement large anonymous groups.
Anonymous connections and onion routing
TLDR
A detailed specification of the implemented onion routing system, a vulnerability analysis based on this specification, and performance results are provided.
Responder anonymity and anonymous peer-to-peer file sharing
TLDR
This work presents anonymous peer-to-peer file sharing (APFS) protocols, which provide mutual anonymity for peer- to- peer file sharing, and compares the TCP performance of the APFS protocol to existing overt file sharing systems such as Napster.
A protocol for anonymous communication over the Internet
TLDR
It is shown that Hordes provides anonymity in a degree similar to that of Crowds and Onion Routing, but also that H hordes has numerous performan e advantages.
Mixminion: design of a type III anonymous remailer protocol
TLDR
Mixminion works in a real-world Internet environment, requires little synchronization or coordination between nodes, and protects against known anonymity-breaking attacks as well as or better than other systems with similar design parameters.
P/sup 5/ : a protocol for scalable anonymous communication
TLDR
A novel feature of P/sup 5/ is that it allows individual participants to trade-off degree of anonymity for communication efficiency, and hence can be used to scalably implement large anonymous groups.
Towards an Information Theoretic Metric for Anonymity
TLDR
An alternative information theoretic measure of anonymity is proposed which takes into account the probabilities of users sending and receiving the messages and is shown how to calculate it for a message in a standard mix-based anonymity system.
Proxies for anonymous routing
TLDR
This paper describes a flexible communications infrastructure, called onion routing, which is resistant to traffic analysis, and provides application-independent, real-time and bi-directional anonymous connections that are resistant to both eavesdropping and traffic analysis.
Efficient Sharing of Encrypted Data
TLDR
The main idea advocated in this paper is that simple cryptographic techniques are sufficient to engineer an efficient data encoding that can make it significantly harder to selectively censor information.
...
...