Completed
Conclusion
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
On the Complexity of Anonymous Communication Through Public Networks
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Encryption hides message content ...
- 3 A practical approach: onion routing [Cha81]
- 4 The idea: onions "mix" at honest nodes
- 5 Definition of security for an anonymous channel
- 6 Related work
- 7 A solution in the passive adversary setting [ALU18]
- 8 but II, isn't anonymous in the active adversary setting
- 9 Attacks highlight necessary (and sufficient) properties for anonymity
- 10 Tool for mixing: checkpoint onions [ALU18]
- 11 Tool for equalizing: merging onions
- 12 A stepping stone construction: II (Pi-tree)
- 13 II, plus a butterfly network
- 14 IIA, plus a stretched butterfly network
- 15 Our final construction: II (Pi-butterfly)
- 16 Conclusion