On anonymity metrics for practical anonymous communication protocols (Japanese)

In: Transactions of the Information Processing Society of Japan   ;  45 ,  8  ;  1887-1897  ;  2004
  • ISSN:
  • Article (Journal)  /  Print

How to get this document?

Anonymous communication protocols are indispensable to protect users' privacy in open networks such as the Internet. Therefore they have wide application, e.g., electronic voting, and enormous research has been conducted on them. However, since it is difficult to devise general 'anonymity metrics' for practical anonymous protocols such as Crowds, few attempts have been made so far to establish such measures. Therefore, toward anonymity evaluation of practical anonymous networks, first we propose and formalize two novel anonymity metrics for practical anonymous communication networks. Next we shall discuss whether or not deterministic protocols can provide anonymity efficiently in terms of computational complexity. Unfortunately, we can show that it is difficult to build efficient anonymous networks only by means of deterministic approaches. We also run simulation experiments and discuss the results.

Table of contents – Volume 45, Issue 8

Show all volumes and issues

The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.

Proposal of an iris identification scheme hiding iris codes
Ota, H. / Kiyomoto, S. / Tanaka, T. | 2004
Design of security architecture for beyond 3G mobile terminals
Kiyomoto, S. / Tanaka, T. / Yoshida, M. / Kuroda, M. | 2004
On anonymity metrics for practical anonymous communication protocols
Kitazawa, S. / Soshi, M. / Miyaji, A. | 2004
A study for some experiences of the operation of highly interactive decoy system
Shibuya, Y. / Koike, H. / Takada, T. / Yasumura, M. / Ishii, T. | 2004
Routing information based packet filtering for IP spoofing prevention
Nakano, M. / Matsumoto, T. | 2004
Regression test selection based on intermediate code for virtual machines
Koju, T. / Takada, S. / Doi, N. | 2004
Generation of character animation holding a tool with its both hands by using three 6DOF trackers
Kawasaki, R. / Kitamura, Y. / Kishino, F. | 2004
A technique to reduce false positives of network IDS with machine learning
Ohya, H. / Miyaji, R. / Kawaguchi, N. / Shigeno, H. / Okada, K. | 2004