[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[freehaven-cvs] Mostly changes to strategic alpha stuff
Update of /home/freehaven/cvsroot/doc/alpha-mixing
In directory moria:/tmp/cvs-serv28349
Modified Files:
alpha-mixing.tex
Log Message:
Mostly changes to strategic alpha stuff
Index: alpha-mixing.tex
===================================================================
RCS file: /home/freehaven/cvsroot/doc/alpha-mixing/alpha-mixing.tex,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -d -r1.2 -r1.3
--- alpha-mixing.tex 9 Mar 2006 13:20:20 -0000 1.2
+++ alpha-mixing.tex 9 Mar 2006 18:49:15 -0000 1.3
@@ -109,6 +109,7 @@
\section{Deterministic-alpha mix}
+\label{sec:deterministic-alpha-mix}
Perhaps the simplest version of alpha mixing is one in which mixes
fire at regular intervals. This is also most naturally in keeping with
@@ -142,7 +143,7 @@
$\alpha=0$ messages is randomly permuted before they are sent.) All
remaining messages have their $\alpha$ decremented by one. New
messages that arrive before the next firing are labeled with some
-$\alpha$ and are placed at the according $\alpha$ level.
+initial $\alpha_0$ and are placed at the according $\alpha$ level.
\paragraph{Threshold deterministic-alpha mix:}
@@ -153,12 +154,12 @@
= 1$ may be above the firing threshold, there may be more than the
threshold number of messages in a batch. Also we assume that the input
buffer of the mix is read after the alpha stack is decremented but
-always before firing, so the received $\alpha = 0$ messages and the
-decremented to $\alpha = 0$ messages are all sent together even if
+always before firing, so the received messages with $\alpha_0 = 0$ and the
+decremented-to-($\alpha = 0$) messages are all sent together even if
there were more than the threshold of messages already in the stack at
$\alpha = 1$. Note that many messages with $\alpha > 0$ may be waiting
in a mix before a threshold number of $\alpha = 0$ arrive. This is
-akin to the fact that many mixes in a free-route batch mix net may be
+akin to the fact that many mixes in a free-route threshold-mix net may be
waiting and nearly full while messages are being accumulated at
relatively empty mixes.
@@ -171,6 +172,7 @@
\subsection{Deterministic-alpha mix:\\
anonymity against a local passive adversary}
+\label{sec:passive-adversary-anonymity}
We will describe anonymity for a threshold mix. As we have already
noted, we assume a steady-state network in which messages arrive at
@@ -205,9 +207,9 @@
entropy has increased by $\log(n(k-j)$.) If the adversary does not
know the strategy, then we cannot put a precise number on the
uncertainty. However, the less predictable the range is to the
- adversary, the greater the uncertainty is even if we cannot say how
+ adversary, the greater the uncertainty is, even if we cannot say how
much. She can either guess too small a range and risk not seeing the
- output message at all, or guess too large and include many other
+ output message at all, or guess too large and include many additional
batches in the anonymity set for the message. (These points carry
over mutatis mutandis when we reason probabilistically rather than
just possibilistically.)
@@ -236,7 +238,7 @@
\end{claim}
In sum, for threshold mixes or steady-state timed mixes, choosing
-$\alpha$ from a broader range improves the anonymity for a message
+$\alpha_0$ from a broader range improves the anonymity for a message
whether the adversary knows one's strategy or not. And, if the
adversary knows nothing about the strategies of choosing alphas or
knows simply the distribution of strategies, then increasing the
@@ -267,7 +269,7 @@
always given relatively low alpha messages, then the mixes that can
tell a message is more sensitive will not be the ones knowing the
ultimate source or destination. For example, given a message with a
-cumulative $A = \sum \alpha$, a path with alpha distribution given by
+cumulative $A = \sum \alpha_0$, a path with alpha distribution given by
$0$, $1$, $\lceil A/2 -2 \rceil$, $\lceil A/2 -2 \rceil$, $1$, $0$
should both hide the sensitivity of the endpoints and diffuse the
trust so that an adversary comprising a single bad mix and a global
@@ -286,7 +288,7 @@
no guarantee that the message that exited the mix is the same message
that entered. The attack is never exact (guaranteed to recognize a
target message as it exits the mix) unless the adversary can bound the
-range of $\alpha_0$ with certainty for a given message.
+range of $\alpha_0$ with certainty for all messages he observes.
A very lightweight dummy policy can guarantee that no exact attack is
possible against an alpha mix, even for active attackers. Simply
@@ -311,10 +313,11 @@
distribution can be determined by observation. Mixes joining the
network can be initialized with a default expected distribution
averaged from one or more mixes already in the network. If the network
-is uninitialized, a uniform strategy (as above), or better a weighted
+is uninitialized, individual mixes can be initialized with
+a uniform strategy (as above), or better a weighted
one, e.g., add a dummy at level $\alpha$ with probability
-$1/2^{\alpha+1}$, and then periodically shifted to reflect the
-distribution alphas for actual traffic through the mix.
+$1/2^{\alpha+1}$. Dummy policy can then be periodically shifted
+to reflect the distribution of alphas for actual traffic through the mix.
If active attacks are suspected, the amount of dummy traffic added to
the alpha stack can be increased according to the expected duration of
@@ -579,43 +582,86 @@
Performance is a function of network load. No guaranteed minimum delays --
but guaranteed minimum anonymity sets, assuming no blending attacks?
-\section{Dummies}
-
-Just as with batching-taxonomy and generalized-batching, we want to
-provide uncertainty even in edge cases.
-
-The active attacker can arrange an edge case via blending attacks, but
-a passive attacker can also simply wait for an edge case to occur.
-
-We need to always apply the dummy strategy because we can't know
-if we're under attack. Dummies should be routed back to ourselves,
-a la heartbeat-traffic.
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+%
+% Following section is now all in rewritten
+% Dummies section above, no? -PFS
+%
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+%
+%\section{Dummies}
+%
+%Just as with batching-taxonomy and generalized-batching, we want to
+%provide uncertainty even in edge cases.
+%
+%The active attacker can arrange an edge case via blending attacks, but
+%a passive attacker can also simply wait for an edge case to occur.
+%
+%We need to always apply the dummy strategy because we can't know
+%if we're under attack. Dummies should be routed back to ourselves,
+%a la heartbeat-traffic.
+%
+%
+%What fraction of the traffic is dummies, then? We can graph this for
+%various strategies. Paul says (for timed): always send out at least
+%2 messages, and always add at least one dummy. In this case the dummy
+%overhead is bounded: between NL and 2NL for N mixes. (This sounds
+%suspicious now that I see it again -- is it wrong? -RD)
+%
+%Note that we can achieve Andrei's goal of strict uncertainty with
+%way more efficiency just by having a single dummy anywhere in the
+%buckets.
+%\section{Game Theory}
+\section{Strategic Choice of Alpha}
-What fraction of the traffic is dummies, then? We can graph this for
-various strategies. Paul says (for timed): always send out at least
-2 messages, and always add at least one dummy. In this case the dummy
-overhead is bounded: between NL and 2NL for N mixes. (This sounds
-suspicious now that I see it again -- is it wrong? -RD)
+As observed in section~\ref{passive-adversary-anonymity}, the
+anonymity of any message can be improved by greater uncertainty about
+the alpha level of \emph{other} messages. Since Alice benefits from
+the fact that other people might choose non-zero $\alpha_0$ for their
+messages, she has an incentive to take advantage of this by choosing a
+lower $\alpha$ to get better performance but still have good security.
+This can be viewed as a commons: everybody will hope that somebody else
+takes the latency hit.
-Note that we can achieve Andrei's goal of strict uncertainty with
-way more efficiency just by having a single dummy anywhere in the
-buckets.
+Not all users have the same sensitivity level, however. In fact users
+will have different sensitivity levels for different communications.
+In~\cite{econymics} it was shown that there can be optimal levels of
+free riding: more-sensitive users have incentive to provide ``free''
+communications service for less-sensitive users by running network
+nodes because this will still provide additional value in the form of
+better anonymity protection for the more-sensitive users. This can
+provide adequate incentive even if there are many others running nodes.
+Similarly, while the existence of higher $\alpha$ traffic may reduce
+my incentive to set higher $\alpha$ levels for my own traffic, it
+does not eliminate that incentive.
-\section{Game theory}
+Choosing alpha range based on the sensitivity and timeliness
+constraints of one's own messages increases the autonomy and control
+over one's own security and utility. Indeed, if an adversary can make
+reasonable guesses about a choice of alpha range for a message, then
+increased alpha for other messages in a mix might not increase
+anonymity for a target message, e.g., if that increased alpha would
+only vary the range that is after the target message is expected to
+have left the mix.
-Since Alice benefits from the fact that other people might choose non-zero
-$\alpha$, she has an incentive to take advantage of this by choosing a
-lower $\alpha$ to get better performance but still have good security. In
-the limit, it's a commons: everybody will hope that somebody else takes
-the latency hit.
+More significantly, however, security is hard to get right when it
+doesn't depend on the strategic behavior of others. Users of the
+system are not likely to have such finetuned knowledge of the system,
+the behavior of others, and their own needs. Thus if we can
+prescribe recommendations for choice of alpha, e.g., based on
+analysis and observed patterns within the network, we can expect
+most people to heed them. (Although they may not follow them. We
+can expect hyperbolic discounting of risk, disregard of risk
+for expedience, etc.~\cite{acquisti04}.)
-Did our equations in sec-analysis show that Alice gets better anonymity
-if she's the one who chooses the higher alpha? If so then we're more ok.
+Alpha mixing itself is likely to affect the applications that can
+be securely used and how, so recommendations are likely to evolve.
+Initial recommendations can be guided by existing anonymity networks.
+Traffic that must arrive in realtime obiously must have $\sum \alpha = 0$.
+For more sensitive traffic, we might initially try to follow
+networks such as Mixminion. But how to do that since mixing*****
-Mixminion and Tor are in some sense the two extremes of the goal spectrum.
-More generally, the senders in our mixnet have utility functions U that
-describe what $\Sigma\alpha$ they will pick. Our whole design works because
some of the users favor performance and some favor anonymity. Three
factors are most important here:
@@ -653,6 +699,11 @@
\section{Distributing your alphas over the path}
+******************************************\\
+Presumably Andrei will incorporate this with the section above
+(\label{sec:distributing-alpha}) when he picks it up later today.\\
+******************************************\\
+
The first node (or second, or...) can learn about Alice's paranoia
level. So given $\Sigma \alpha$ which represents Alice's concern for
this message's anonymity, we need an algorithm for allocating which
***********************************************************************
To unsubscribe, send an e-mail to majordomo@xxxxxxxx with
unsubscribe freehaven-cvs in the body. http://freehaven.net/