Publications about JonDonym

From JonDonym Wiki
(Difference between revisions)
Jump to: navigation, search
(+ TU Dresden Kopsell)
(added bg)
Line 1: Line 1:
 
<iimg>[[Publications about JonDonym]]![[Image:en2.png]]</iimg><iimg>[[Veröffentlichungen zu JonDonym]]![[Image:de2.png]]</iimg>&nbsp;[[Main_Page|Main Page (en)]]
 
<iimg>[[Publications about JonDonym]]![[Image:en2.png]]</iimg><iimg>[[Veröffentlichungen zu JonDonym]]![[Image:de2.png]]</iimg>&nbsp;[[Main_Page|Main Page (en)]]
 +
 
== Publications related to JonDonym ==
 
== Publications related to JonDonym ==
 +
 +
=== JAPTechBgPaper ===
 +
 +
Old paper about Internet anonymisation and early JAP.
 +
 +
Download: [http://anon.inf.tu-dresden.de/JAPTechBgPaper.pdf TechBgPaper.pdf], 4 MiB PDF, 5 pages, German only, 2001-July
 +
 
===Malice versus AN.ON: Possible Risks of Missing Replay and Integrity Protection===
 
===Malice versus AN.ON: Possible Risks of Missing Replay and Integrity Protection===
Benedikt Westermann and Dogan Kesdogan. ''Malice versus AN.ON: Possible Risks of Missing Replay and Integrity Protection''. To appear in the proceedings of Financial Cryptography and Data Security 2011, Feb 2011. [http://www.beneficium.de/wp-content/publications/2011/wk2011.pdf PDF] ([https://anonymous-proxy-servers.net/paper/wk2011.pdf local cache])
+
 
 +
Benedikt Westermann and Dogan Kesdogan. ''Malice versus AN.ON: Possible Risks of Missing Replay and Integrity Protection''. To appear in the proceedings of Financial Cryptography and Data Security 2011.
 +
 
 +
Download: [http://www.beneficium.de/wp-content/publications/2011/wk2011.pdf PDF] ([https://anonymous-proxy-servers.net/paper/wk2011.pdf local copy]) 2011-Februar
  
 
=== Development and providing an anonymous service ===
 
=== Development and providing an anonymous service ===
  
By Dr. Stefan Köpsell, Technische Universität Dresden, Fakultät Informatik, 2010 [http://www.qucosa.de/fileadmin/data/qucosa/documents/2740/DissBibliotheksVersion.pdf PDF] ([https://anonymous-proxy-servers.net/paper/DissertationStefanKoepsell.pdf local Copy]) 9 MiB, German only
+
Paper about Internet anonymisation, includes JAP and JonDo history.
 +
 
 +
By Dr. Stefan Köpsell, Technische Universität Dresden, Fakultät Informatik, [http://www.qucosa.de/fileadmin/data/qucosa/documents/2740/DissBibliotheksVersion.pdf DissBibliotheksVersion.pdf] ([https://anonymous-proxy-servers.net/paper/DissertationStefanKoepsell.pdf local copy]) 9 MiB PDF, 441 pages, German only, released 2010-March
  
 
===Introducing perfect forward secrecy for AN.ON===
 
===Introducing perfect forward secrecy for AN.ON===
 +
 
Benedikt Westermann and Dogan Kesdogan. ''Introducing perfect forward secrecy for AN.ON.'' In Finn Arve Aagesen and Svein J. Knapskog, editors, EUNICE, volume 6164 of Lecture Notes in Computer Science, pages 132-142. Springer, June 2010. [http://www.beneficium.de/wp-content/publications/2010/wk10.pdf PDF] ([https://anonymous-proxy-servers.net/paper/wk10.pdf local cache])
 
Benedikt Westermann and Dogan Kesdogan. ''Introducing perfect forward secrecy for AN.ON.'' In Finn Arve Aagesen and Svein J. Knapskog, editors, EUNICE, volume 6164 of Lecture Notes in Computer Science, pages 132-142. Springer, June 2010. [http://www.beneficium.de/wp-content/publications/2010/wk10.pdf PDF] ([https://anonymous-proxy-servers.net/paper/wk10.pdf local cache])
  
 
===Cryptographic protocol analysis of AN.ON===
 
===Cryptographic protocol analysis of AN.ON===
 +
 
Benedikt Westermann, Rolf Wendolsky, Lexi Pimenidis, and Dogan Kesdogan. ''Cryptographic protocol analysis of AN.ON.'' In Radu Sion, editor, Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, pages 114-128. Springer, January 2010. [http://www.beneficium.de/wp-content/publications/2010/wwpk2010.pdf PDF] ([https://anonymous-proxy-servers.net/paper/wwpk2010.pdf local cache])
 
Benedikt Westermann, Rolf Wendolsky, Lexi Pimenidis, and Dogan Kesdogan. ''Cryptographic protocol analysis of AN.ON.'' In Radu Sion, editor, Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, pages 114-128. Springer, January 2010. [http://www.beneficium.de/wp-content/publications/2010/wwpk2010.pdf PDF] ([https://anonymous-proxy-servers.net/paper/wwpk2010.pdf local cache])
  
 
===Security analysis of AN.ON’s payment scheme===
 
===Security analysis of AN.ON’s payment scheme===
 +
 
Benedikt Westermann. ''Security analysis of AN.ON’s payment scheme.'' In Audun Jøsang, Torleiv Maseng, and Svein J. Knapskog, editors, NordSec, volume 5838 of Lecture Notes in Computer Science, pages 255-270. Springer, October 2009. [http://www.beneficium.de/wp-content/publications/2009/w09.pdf PDF] ([https://anonymous-proxy-servers.net/paper/w09.pdf local cache])
 
Benedikt Westermann. ''Security analysis of AN.ON’s payment scheme.'' In Audun Jøsang, Torleiv Maseng, and Svein J. Knapskog, editors, NordSec, volume 5838 of Lecture Notes in Computer Science, pages 255-270. Springer, October 2009. [http://www.beneficium.de/wp-content/publications/2009/w09.pdf PDF] ([https://anonymous-proxy-servers.net/paper/w09.pdf local cache])
  
 
=== Revocable Anonymity ===
 
=== Revocable Anonymity ===
 +
 
''Abstract:'' All users logged into the system appear under a group pseudonym (Threshold group signature scheme) that is related to their IP address, but in a way that only all mixes together may uncover it (in order to conceal the IP in the group pseudonym, the first mix issues blind signatures). In order to use the service, they have to do signatures with their pseudonym, that can be verified by the last mix. These signatures may be assigned to a user IP, if a law enforcement agency presents a valid court order to all mixes for the surveillance of one or more URLs and the user visits one of these URLs, but only if all mixes work together. Even in this case, only this single IP is uncovered, which is not even visible by the mix operators, but by the law enforcement agency only (threshold atomic proxy reencryption). This revocation may be done in real-time or via data logged in the past.''
 
''Abstract:'' All users logged into the system appear under a group pseudonym (Threshold group signature scheme) that is related to their IP address, but in a way that only all mixes together may uncover it (in order to conceal the IP in the group pseudonym, the first mix issues blind signatures). In order to use the service, they have to do signatures with their pseudonym, that can be verified by the last mix. These signatures may be assigned to a user IP, if a law enforcement agency presents a valid court order to all mixes for the surveillance of one or more URLs and the user visits one of these URLs, but only if all mixes work together. Even in this case, only this single IP is uncovered, which is not even visible by the mix operators, but by the law enforcement agency only (threshold atomic proxy reencryption). This revocation may be done in real-time or via data logged in the past.''
  
Stefan Köpsell, Rolf Wendolsky, Hannes Federrath. ''Revocable Anonymity'' In: Günter Müller (Ed.): Proc. Emerging Trends in Information and Communication Security: International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006, LNCS 3995, Springer-Verlag, Heidelberg 2006, 206--220. [http://anon.inf.tu-dresden.de/publications/KWF2006ETRICSRevocableAnonymity.pdf PDF] ([https://anonymous-proxy-servers.net/paper/RevocableAnonymity.pdf local cache])
+
Stefan Köpsell, Rolf Wendolsky, Hannes Federrath. ''Revocable Anonymity'' In: Günter Müller (Ed.): Proc. Emerging Trends in Information and Communication Security: International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006, LNCS 3995, Springer-Verlag, Heidelberg 2006, 206--220. [http://anon.inf.tu-dresden.de/publications/KWF2006ETRICSRevocableAnonymity.pdf PDF] ([https://anonymous-proxy-servers.net/paper/RevocableAnonymity.pdf local copy])
 +
 
 +
=== Strafverfolgung trotz Anonymität (Law enforcement and Anonymity  in Germany) ===
  
=== Law enforcement and Anonymity (German) ===
 
 
''Abstract:'' Erfahrungen mit dem Betrieb eines Anonymisierungsdienstes zeigen, dass ein solcher Dienst auch für Straftaten missbraucht wird. Das Paper beschäftigt sich damit, wie eine datenschutzgerechte Deanonymiserung in konkreten Einzelfällen durchgeführt werden kann, ohne die Anonymität der anderen Teilnehmer zu gefährden.
 
''Abstract:'' Erfahrungen mit dem Betrieb eines Anonymisierungsdienstes zeigen, dass ein solcher Dienst auch für Straftaten missbraucht wird. Das Paper beschäftigt sich damit, wie eine datenschutzgerechte Deanonymiserung in konkreten Einzelfällen durchgeführt werden kann, ohne die Anonymität der anderen Teilnehmer zu gefährden.
  
Stefan Köpsell, Tobias Mioska: Technische Universität Dresden, [https://anonymous-proxy-servers.net/paper/Strafverfolgung_trotz_Anonymität.pdf Strafverfolgung trotz Anonymität] (German, 12 pages)
+
Download: Stefan Köpsell, Tobias Mioska: Technische Universität Dresden, [https://anonymous-proxy-servers.net/paper/Strafverfolgung_trotz_Anonymität.pdf local copy (dead link)] German, 12 pages
  
 
=== Low Latency Anonymous Communication - How long are users willing to wait? ===
 
=== Low Latency Anonymous Communication - How long are users willing to wait? ===
 +
 
''Abstract:'' In the course of some practical research we realised the correlation between latency in the anonymisation system and the number of users logged into it is linear, at least for the Dresden-Dresden cascade. This insight may help designing technical measures to strengthen anonymity that need a higher latency without diminishing the expected user numbers too strong. A performance measurement of different anonymisation services (Tor, AN.ON) gave some clues that the users might have a common tolerance level regarding latency (about 4 seconds), that adjusts itself if the users are randomly distributed on the servers of a service. This was concluded from the unverifiable latency difference between the very frequented Dresden-Dresden cascade and Tor. An analysis of the URLs requested via AN.ON has shown that 33% of them had erotic content, 26% were web-based services (including e-mail), 8% were corporate sites and the rest had very mixed content. Surprisingly, no URLs of web-shops or health portals have been observed. 60% of the users who requested these contents came from Europe, 27% from Asia and 12% from America, whereas the origin of some was not detectable because of the use of JAP-Forwarding-Servers. This means that AN.ON is still a primary inner-european anonymisation service.Users and requested URLs have not been linked together for these studies.
 
''Abstract:'' In the course of some practical research we realised the correlation between latency in the anonymisation system and the number of users logged into it is linear, at least for the Dresden-Dresden cascade. This insight may help designing technical measures to strengthen anonymity that need a higher latency without diminishing the expected user numbers too strong. A performance measurement of different anonymisation services (Tor, AN.ON) gave some clues that the users might have a common tolerance level regarding latency (about 4 seconds), that adjusts itself if the users are randomly distributed on the servers of a service. This was concluded from the unverifiable latency difference between the very frequented Dresden-Dresden cascade and Tor. An analysis of the URLs requested via AN.ON has shown that 33% of them had erotic content, 26% were web-based services (including e-mail), 8% were corporate sites and the rest had very mixed content. Surprisingly, no URLs of web-shops or health portals have been observed. 60% of the users who requested these contents came from Europe, 27% from Asia and 12% from America, whereas the origin of some was not detectable because of the use of JAP-Forwarding-Servers. This means that AN.ON is still a primary inner-european anonymisation service.Users and requested URLs have not been linked together for these studies.
  
Line 33: Line 52:
  
 
===The disadvantages of free MIX routes and how to overcome them===
 
===The disadvantages of free MIX routes and how to overcome them===
 +
 
Oliver Berthold, Andreas Pfitzmann, Ronny Standtke. ''The disadvantages of free MIX routes and how to overcome them.''  
 
Oliver Berthold, Andreas Pfitzmann, Ronny Standtke. ''The disadvantages of free MIX routes and how to overcome them.''  
 
In the Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, July 2000 ([https://anonymous-proxy-servers.net/paper/disad-free-routes.pdf local cache])
 
In the Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, July 2000 ([https://anonymous-proxy-servers.net/paper/disad-free-routes.pdf local cache])
  
See also [[Publications_about_tracking_and_spying_technologies]]
+
=== See also ===
 +
 +
[[Publications_about_tracking_and_spying_technologies]]

Revision as of 05:48, 1 February 2012

En2.png De2.png  Main Page (en)

Contents

Publications related to JonDonym

JAPTechBgPaper

Old paper about Internet anonymisation and early JAP.

Download: TechBgPaper.pdf, 4 MiB PDF, 5 pages, German only, 2001-July

Malice versus AN.ON: Possible Risks of Missing Replay and Integrity Protection

Benedikt Westermann and Dogan Kesdogan. Malice versus AN.ON: Possible Risks of Missing Replay and Integrity Protection. To appear in the proceedings of Financial Cryptography and Data Security 2011.

Download: PDF (local copy) 2011-Februar

Development and providing an anonymous service

Paper about Internet anonymisation, includes JAP and JonDo history.

By Dr. Stefan Köpsell, Technische Universität Dresden, Fakultät Informatik, DissBibliotheksVersion.pdf (local copy) 9 MiB PDF, 441 pages, German only, released 2010-March

Introducing perfect forward secrecy for AN.ON

Benedikt Westermann and Dogan Kesdogan. Introducing perfect forward secrecy for AN.ON. In Finn Arve Aagesen and Svein J. Knapskog, editors, EUNICE, volume 6164 of Lecture Notes in Computer Science, pages 132-142. Springer, June 2010. PDF (local cache)

Cryptographic protocol analysis of AN.ON

Benedikt Westermann, Rolf Wendolsky, Lexi Pimenidis, and Dogan Kesdogan. Cryptographic protocol analysis of AN.ON. In Radu Sion, editor, Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, pages 114-128. Springer, January 2010. PDF (local cache)

Security analysis of AN.ON’s payment scheme

Benedikt Westermann. Security analysis of AN.ON’s payment scheme. In Audun Jøsang, Torleiv Maseng, and Svein J. Knapskog, editors, NordSec, volume 5838 of Lecture Notes in Computer Science, pages 255-270. Springer, October 2009. PDF (local cache)

Revocable Anonymity

Abstract: All users logged into the system appear under a group pseudonym (Threshold group signature scheme) that is related to their IP address, but in a way that only all mixes together may uncover it (in order to conceal the IP in the group pseudonym, the first mix issues blind signatures). In order to use the service, they have to do signatures with their pseudonym, that can be verified by the last mix. These signatures may be assigned to a user IP, if a law enforcement agency presents a valid court order to all mixes for the surveillance of one or more URLs and the user visits one of these URLs, but only if all mixes work together. Even in this case, only this single IP is uncovered, which is not even visible by the mix operators, but by the law enforcement agency only (threshold atomic proxy reencryption). This revocation may be done in real-time or via data logged in the past.

Stefan Köpsell, Rolf Wendolsky, Hannes Federrath. Revocable Anonymity In: Günter Müller (Ed.): Proc. Emerging Trends in Information and Communication Security: International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006, LNCS 3995, Springer-Verlag, Heidelberg 2006, 206--220. PDF (local copy)

Strafverfolgung trotz Anonymität (Law enforcement and Anonymity in Germany)

Abstract: Erfahrungen mit dem Betrieb eines Anonymisierungsdienstes zeigen, dass ein solcher Dienst auch für Straftaten missbraucht wird. Das Paper beschäftigt sich damit, wie eine datenschutzgerechte Deanonymiserung in konkreten Einzelfällen durchgeführt werden kann, ohne die Anonymität der anderen Teilnehmer zu gefährden.

Download: Stefan Köpsell, Tobias Mioska: Technische Universität Dresden, local copy (dead link) German, 12 pages

Low Latency Anonymous Communication - How long are users willing to wait?

Abstract: In the course of some practical research we realised the correlation between latency in the anonymisation system and the number of users logged into it is linear, at least for the Dresden-Dresden cascade. This insight may help designing technical measures to strengthen anonymity that need a higher latency without diminishing the expected user numbers too strong. A performance measurement of different anonymisation services (Tor, AN.ON) gave some clues that the users might have a common tolerance level regarding latency (about 4 seconds), that adjusts itself if the users are randomly distributed on the servers of a service. This was concluded from the unverifiable latency difference between the very frequented Dresden-Dresden cascade and Tor. An analysis of the URLs requested via AN.ON has shown that 33% of them had erotic content, 26% were web-based services (including e-mail), 8% were corporate sites and the rest had very mixed content. Surprisingly, no URLs of web-shops or health portals have been observed. 60% of the users who requested these contents came from Europe, 27% from Asia and 12% from America, whereas the origin of some was not detectable because of the use of JAP-Forwarding-Servers. This means that AN.ON is still a primary inner-european anonymisation service.Users and requested URLs have not been linked together for these studies.

Stefan Köpsell: Low Latency Anonymous Communication - How long are users willing to wait? In: Günter Müller (Ed.): Proc. Emerging Trends in Information and Communication Security: International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006, LNCS 3995, Springer-Verlag, Heidelberg 2006, 221--237.

The disadvantages of free MIX routes and how to overcome them

Oliver Berthold, Andreas Pfitzmann, Ronny Standtke. The disadvantages of free MIX routes and how to overcome them. In the Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, July 2000 (local cache)

See also

Publications_about_tracking_and_spying_technologies

Personal tools