[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[freehaven-cvs] Be consistant with naming of the system: "the Pyncho...
Update of /home2/freehaven/cvsroot/doc/pynchon-gate
In directory moria.mit.edu:/tmp/cvs-serv21268
Modified Files:
pynchon.tex pynchon.bib
Log Message:
Be consistant with naming of the system: "the Pynchon Gate".
Add two "usability issues" citations.
Index: pynchon.tex
===================================================================
RCS file: /home2/freehaven/cvsroot/doc/pynchon-gate/pynchon.tex,v
retrieving revision 1.66
retrieving revision 1.67
diff -u -d -r1.66 -r1.67
--- pynchon.tex 20 Sep 2004 11:04:09 -0000 1.66
+++ pynchon.tex 20 Sep 2004 12:34:56 -0000 1.67
@@ -163,7 +163,7 @@
remailer networks.\footnote{Other descriptions of the use of PIR in
preserving recipient anonymity have been independently proposed but not
deployed~\cite{berthold,cooper}. Independent work by Jim McCoy describes a
-similar architecture to The Pynchon Gate, but does not use an
+similar architecture to the Pynchon Gate, but does not use an
information-theoretic primative for preserving privacy~\cite{mccoy}.} It
is trivial to use these systems to {\it send} pseudonymous messages: the
sender can make an anonymous message pseudonymous by signing it with a
@@ -298,7 +298,7 @@
\section{The Pynchon Gate Design}
\label{sec:design}
-We present a design framework for The Pynchon Gate. A detailed
+We present a design framework for the Pynchon Gate. A detailed
implementation specification can be found in~\cite{pynchon-spec}.
\subsection{Overview and Rationale}
@@ -348,7 +348,7 @@
\subsection{The Nym Server}
-The public-facing side of The Pynchon Gate consists of a nym server that
+The public-facing side of the Pynchon Gate consists of a nym server that
sends and receives pseudonymous email. The nym server itself provides no
sender anonymity; rather, it relies on existing mix
networks~\cite{mixminion,mixmaster-spec}.
@@ -566,7 +566,7 @@
The Pynchon Gate uses mix-nets for forward message delivery only. Attacks
that do not work against a mix-net in normal forward-delivery mode will
-not impact Pynchon Gate.
+not impact the Pynchon Gate.
\subsubsection{Man-in-the-middle attacks.}
An attacker able to pose as a user's chosen distributors could trivially
@@ -619,7 +619,7 @@
social engineering attack may be performed if the nym holder is using a
separate message encryption protocol such as PGP~\cite{rfc-2440}. More
research needs to be done to improve the area of privacy-preserving
-human-computer interaction.
+human-computer interaction~\cite{sassaman-lisa,whittenwhy}.
\subsubsection{Usage pattern and intersection attacks.}
@@ -796,7 +796,7 @@
finishing when the next scan returns to that same point. Thus, the latency
is exactly the time of one full scan.
-\subsection{Comparing Pynchon Gate to other systems}
+\subsection{Comparing The Pynchon Gate to other systems}
%XXXX write this. Describe the other systems:
% Type I nymservers, aam, underhill, underhill with full padding,
% pynchon gate. (Is this necessary? We discuss these earlier.)
@@ -845,7 +845,7 @@
$\left[ \frac{N}{S} +1 \right] \sum \CVol_i $ &
$\sum \CVol_i$
n/a \\
-Pynchon Gate &
+The Pynchon Gate &
$\sum \Vol_i + \mbox{Pool} $ &
$\frac{1}{S}\left[ \sum \mbox{ClientB}_i + \mbox{Pool} \right]$ &
% $2 \mbox{ME} I + \mbox{Buckets}_i \left[ (K-1) SS + \frac{(m+I)}{8} + B
@@ -873,7 +873,7 @@
``infrastructure'' to denote mix nodes in the Type I (Cypherpunk) and Type
III (Underhill~\cite{underhill-spec}) nym server systems, NNTP
servers~\cite{rfc-1036} for the Usenet news drop, and distributors in
-Pynchon Gate. $N$ is the total number of users in the system. $\Vol_i$ is
+the Pynchon Gate. $N$ is the total number of users in the system. $\Vol_i$ is
the volume of messages received by user $i$ on a given day. $\CVol_i$ is
this volume after compression. $S$ is the number of nodes in the
infrastructure.
@@ -885,9 +885,9 @@
KB, and a packet size $M$ of 32 KB. For Underhill, $W$ is the maximum
interval at which users must replenish reply blocks. Similarly, $W$ is the
window of time (in days) in which users must retrieve their mail in
-Pynchon Gate.
+the Pynchon Gate.
-Pynchon Gate allocates buckets of size $B$. The number of message buckets
+The Pynchon Gate allocates buckets of size $B$. The number of message buckets
needed ($m$) is calculated as $\sum \left\lceil
\frac{CVol_i}{B}\right\rceil$ and the number of index buckets needed ($I$)
is calculated as $\left\lceil \frac{N \cdot IE}{B - IE} \right\rceil$,
@@ -895,7 +895,7 @@
PIR stream seed size is $SS$, and $K$ is the number of distributors chosen
from which to retrieve data.
-%\subsection{Pynchon Gate performance under realisic user load}
+%\subsection{Performance of the Pynchon Gate under realisic user load}
If we assume one cycle per day with 10,000 users per collator who receive
100,000 KB of data each cycle, each collator will transfer 2
GB per day. This allows a bucket size of 10 KB, with distributor query sizes
Index: pynchon.bib
===================================================================
RCS file: /home2/freehaven/cvsroot/doc/pynchon-gate/pynchon.bib,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -d -r1.20 -r1.21
--- pynchon.bib 20 Sep 2004 11:04:09 -0000 1.20
+++ pynchon.bib 20 Sep 2004 12:34:56 -0000 1.21
@@ -311,6 +311,14 @@
www_ps_url = {http://theory.lcs.mit.edu/~madhu/papers/pir-journ.ps},
}
+@inproceedings{whittenwhy,
+ author = "Alma Whitten and J. D. Tygar",
+ title = "Why {J}ohnny can't encrypt: {A} usability evaluation of {PGP} 5.0",
+ booktitle = "8th USENIX Security Symposium",
+ year = "1999",
+ url = "citeseer.ist.psu.edu/whitten99why.html",
+ url = "citeseer.nj.nec.com/whitten99why.html" }
+
@article{beimel01informationtheoretic,
author = {Amos Beimel and Yuval Ishai},
title = {Information-Theoretic Private Information Retrieval: {A} Unified Construction},
***********************************************************************
To unsubscribe, send an e-mail to majordomo@seul.org with
unsubscribe freehaven-cvs in the body. http://freehaven.net/