We gratefully acknowledge support from
the Simons Foundation and member institutions.
Full-text links:

Download:

Current browse context:

cs.CR

Change to browse by:

cs

References & Citations

DBLP - CS Bibliography

Bookmark

(what is this?)
CiteULike logo BibSonomy logo Mendeley logo del.icio.us logo Digg logo Reddit logo ScienceWISE logo

Computer Science > Cryptography and Security

Title: Stopping Silent Sneaks: Defending against Malicious Mixes with Topological Engineering

Abstract: Mixnets provide strong meta-data privacy and recent academic research and industrial projects have made strides in making them more secure, performance, and scalable. In this paper, we focus our work on stratified Mixnets -- a popular design with real-world adoption -- and identify that there still exist heretofore inadequately explored practical aspects such as: relay sampling and topology placement, network churn, and risks due to real-world usage patterns. We show that, due to the lack of incorporating these aspects, Mixnets of this type are far more susceptible to user deanonymization than expected. In order to reason and resolve these issues, we model Mixnets as a three-stage ``Sample-Placement-Forward'' pipeline, and using the results of our evaluation propose a novel Mixnet design, Bow-Tie. Bow-Tie mitigates user deanonymization through a novel adaption of Tor's guard design with an engineered guard layer and client guard-logic for stratified mixnets. We show that Bow-Tie has significantly higher user anonymity in the dynamic setting, where the Mixnet is used over a period of time, and is no worse in the static setting, where the user only sends a single message. We show the necessity of both the guard layer and client guard-logic in tandem as well as their individual effect when incorporated into other reference designs. Ultimately, Bow-Tie is a significant step towards addressing the gap between the design of Mixnets and practical deployment and wider adoption because it directly addresses real-world user and Mixnet operator concerns.
Subjects: Cryptography and Security (cs.CR)
Cite as: arXiv:2206.00592 [cs.CR]
  (or arXiv:2206.00592v4 [cs.CR] for this version)

Submission history

From: Xinshu Ma [view email]
[v1] Wed, 1 Jun 2022 16:04:41 GMT (5131kb,D)
[v2] Thu, 2 Jun 2022 10:00:43 GMT (2568kb,D)
[v3] Tue, 7 Jun 2022 09:54:53 GMT (2568kb,D)
[v4] Thu, 4 Aug 2022 13:17:30 GMT (3203kb,D)

Link back to: arXiv, form interface, contact.