AOT: Anonymization by Oblivious Transfer

05/22/2021
by   Farid Javani, et al.
0

We introduce AOT, an anonymous communication system based on mix network architecture that uses oblivious transfer (OT) to deliver messages. Using OT to deliver messages helps AOT resist blending (n-1) attacks and helps AOT preserve receiver anonymity, even if a covert adversary controls all nodes in AOT. AOT comprises three levels of nodes, where nodes at each level perform a different function and can scale horizontally. The sender encrypts their payload and a tag, derived from a secret shared between the sender and receiver, with the public key of a Level-2 node and sends them to a Level-1 node. On a public bulletin board, Level-3 nodes publish tags associated with messages ready to be retrieved. Each receiver checks the bulletin board, identifies tags, and receives the associated messages using OT. A receiver can receive their messages even if the receiver is offline when messages are ready. Through what we call a "handshake" process, communicants can use the AOT protocol to establish shared secrets anonymously. Users play an active role in contributing to the unlinkability of messages: periodically, users initiate requests to AOT to receive dummy messages, such that an adversary cannot distinguish real and dummy requests.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/05/2019

A Private and Unlinkable Message Exchange Using a Public bulletin board in Opportunistic Networks

We plan to simulate a private and unlinkable exchange of messages by usi...
research
03/26/2018

Homa: A Receiver-Driven Low-Latency Transport Protocol Using Network Priorities

Homa is a new transport protocol for datacenter networks. It provides ex...
research
03/15/2018

Covert Communication over a K-User Multiple Access Channel

We consider a scenario in which K transmitters attempt to communicate co...
research
05/08/2018

Multipath Stealth Communication with Jammers

We consider the problem of stealth communication over a multipath networ...
research
08/27/2020

k-ported vs. k-lane Broadcast, Scatter, and Alltoall Algorithms

In k-ported message-passing systems, a processor can simultaneously rece...
research
05/08/2023

Information Mutation and Spread of Misinformation in Timely Gossip Networks

We consider a network of n user nodes that receives updates from a sourc...
research
03/25/2016

"Did I Say Something Wrong?" A Word-Level Analysis of Wikipedia Articles for Deletion Discussions

This thesis focuses on gaining linguistic insights into textual discussi...

Please sign up or login with your details

Forgot password? Click here to reset