IT-Security (Chapter 4) Flashcards
Pseudonym Types
Person pseudonym Role pseudonym Relationship pseudonym Role-relationship pseudonym Transaction pseudonym
Basics Techniques for Data Minimization
Anonymous Communication
Controlled Disclosure
Privacy enhanced ID Management Systems
Anonymity
Anonymity of a subject means that the subject is not identifiable within a set of subjects, the anonymity set
Global Attacker
- Observes all communication
* Observes some nodes
Local Attacker
- Observers some communication
* Observes some nodes
Implicit address
If message is directed to someone, it must contain an attribute so that recipient knows it is directed to him
Explicit address
describes specific place in a network to which message should be delivered
Mix
- Collects messages,
- Deletes duplicates,
- Re-Codes,
- Shuffles,
- Forwards
Pool mixes
Buffer (storage space) for n messages
- Wait until n messages received
- Select a message randomly and forward it
Batch mixes
- Fills up a buffer of size n
2. Send all n messages together but in random order
What is the anonymity set size
Pool: number of messages
ever forwarded by mix at time t
Batch: batch size n
Cascades: (Jondos)
analytical easy to understand −anonymity set = batch size all communication can be observed −high traffic servers −practical implementations of servers are imperfect
Mix Nets (TOR)
less infrastructure needed
low traffic per node
lower assumptions about the servers
−hard to analyze (what is the anonymity set size?)
DC Net
- Toss a coin per neighbor (crown 0, head 1)
2. Broadcast XOR of all neighbor coins XOR your secret