[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[freehaven-cvs] Incorporate some suggestions from George
Update of /home/freehaven/cvsroot/doc/e2e-traffic
In directory moria.mit.edu:/tmp/cvs-serv16093
Modified Files:
e2e-traffic.tex
Log Message:
Incorporate some suggestions from George
Index: e2e-traffic.tex
===================================================================
RCS file: /home/freehaven/cvsroot/doc/e2e-traffic/e2e-traffic.tex,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -d -r1.37 -r1.38
--- e2e-traffic.tex 27 Jan 2004 02:37:38 -0000 1.37
+++ e2e-traffic.tex 27 Jan 2004 11:02:59 -0000 1.38
@@ -17,8 +17,12 @@
\newcommand\Ponline{P_{\mbox{\scriptsize online}}}
\newcommand\Pjunk{P_{\mbox{\scriptsize junk}}}
\newcommand\Pdelay{P_{\mbox{\scriptsize delay}}}
+
+% LLNCS says that vectors should be bold-italic. Past publications on this
+% topic have all used arrows. We use arrows. Should we switch?
\newcommand\V[1]{\overrightarrow{#1}}
\newcommand\B[1]{\overline{#1}}
+%\newcommand\V[1]{\vec{#1}}
\newenvironment{tightlist}{\begin{list}{$\bullet$}{
\setlength{\itemsep}{0mm}
@@ -71,10 +75,10 @@
designs is the \emph{long-term intersection attack}. In
this attack, a passive eavesdropper observes a large volume of network
traffic and notices that certain recipients are more likely to receive
-messages after given senders have transmitted messages.
+messages after particular senders have transmitted messages.
% Although these correlations are slight,
That is, if a sender (call her Alice) maintains a fairly consistent
-behavior pattern over time, the attacker can deduce Alice's recipients.
+pattern of recipients over time, the attacker can deduce Alice's recipients.
Researchers have theorized that these attacks should be extremely
effective in many real-world contexts, but so far it has been difficult
@@ -328,9 +332,15 @@
Danezis also derives a precondition that the attack will only succeed when
\( m < \frac{N}{b-1} \), and calculates the expected number of rounds to
succeed (with $95\%$ confidence for security parameter $l=2$ and $99\%$
-confidence for $l=3$):
-\[t > \left[ m \cdot l \left(\sqrt{\frac{m-1}{m}} +
- \sqrt{\frac{N-1}{N^2}(b-1)} \right) \right]^2 \]
+confidence for $l=3$) \cite{gd-thesis}:
+% This equation (from the statistical disclosure paper) is (George says) wrong.
+%
+%\[t > \left[ m \cdot l \left(\sqrt{\frac{m-1}{m}} +
+% \sqrt{\frac{N-1}{N^2}(b-1)} \right) \right]^2 \]
+%
+% This equation (from George's thesis) is (George says) correct:
+\[t > \left[ m \cdot l \left(\sqrt{\frac{N-1}{N}(b-1)} +
+ \sqrt{\frac{N-1}{N^2}{b-1}+\frac{m-1}{m}} \right] ^2 \]
%======================================================================
\section{Extending the statistical disclosure attack}
@@ -925,7 +935,7 @@
and that the attacker is watching some fraction $f$ of the mixes. We
simulate this by revealing each message entering or leaving the network to
the attacker with probability $\Pobserve=f$. The attacker sees a message
-it enters {\it and} when it exits with probability ${\Pobserve}^2$.
+when it enters {\it and} when it exits with probability $({\Pobserve})^2$.
\begin{figure}[ht]
\centering
***********************************************************************
To unsubscribe, send an e-mail to majordomo@seul.org with
unsubscribe freehaven-cvs in the body. http://freehaven.net/