On the Complexity of Anonymous Communication Through Public Networks
Paul G. Allen School via YouTube
Overview
Syllabus
Intro
Encryption hides message content ...
A practical approach: onion routing [Cha81]
The idea: onions "mix" at honest nodes
Definition of security for an anonymous channel
Related work
A solution in the passive adversary setting [ALU18]
but II, isn't anonymous in the active adversary setting
Attacks highlight necessary (and sufficient) properties for anonymity
Tool for mixing: checkpoint onions [ALU18]
Tool for equalizing: merging onions
A stepping stone construction: II (Pi-tree)
II, plus a butterfly network
IIA, plus a stretched butterfly network
Our final construction: II (Pi-butterfly)
Conclusion
Taught by
Paul G. Allen School