Affiliation:
1. Rensselaer Polytechnic Institute, Troy, NY
Abstract
The past two decades have seen a growing interest in methods for anonymous communication on the Internet, both from the academic community and the general public. Several system designs have been proposed in the literature, of which a number have been implemented and are used by diverse groups, such as journalists, human rights workers, the military, and ordinary citizens, to protect their identities on the Internet.
In this work, we survey the previous research done to design, develop, and deploy systems for enabling private and anonymous communication on the Internet. We identify and describe the major concepts and technologies in the field, including mixes and mix networks, onion routing, and Dining Cryptographers networks. We will also review powerful traffic analysis attacks that have motivated improvements and variations on many of these anonymity protocols made since their introduction. Finally, we will summarize some of the major open problems in anonymous communication research and discuss possible directions for future work in the field.
Publisher
Association for Computing Machinery (ACM)
Subject
General Computer Science,Theoretical Computer Science
Cited by
75 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Let the Users Choose: Low Latency or Strong Anonymity? Investigating Mix Nodes with Paired Mixing Techniques;Proceedings of the 19th International Conference on Availability, Reliability and Security;2024-07-30
2. Activity-based payments: alternative (anonymous) online payment model;International Journal of Information Security;2024-02-03
3. Illegal Patterns Identification on Dark Web Using Machine Learning;2023 International Conference on Emerging Research in Computational Science (ICERCS);2023-12-07
4. Enhancing the Unlinkability of Circuit-Based Anonymous Communications with k-Funnels;Proceedings of the ACM on Networking;2023-11-27
5. Effect of Group Based Synchronization on User Anonymity in Mix Networks;Proceedings of the 18th International Conference on Availability, Reliability and Security;2023-08-29