This is part of the anonymity terminology project. The project goal is to come up with a proposed consensus about what the terms we use to describe implementations in anonymity networks actually mean.
This is part of the anonymity terminology project. The project goal is to come up with a proposed consensus about what the terms we use to describe implementations in anonymity networks actually mean.
...
@@ -10,47 +10,47 @@ This kind of messiness can make papers in the field hard to read: people hear th
...
@@ -10,47 +10,47 @@ This kind of messiness can make papers in the field hard to read: people hear th
Step one of this project is going to be descriptive: let's look through the research literature for statements defining these terms. Let's add more terms as we find them. We should put some effort into finding first uses, but not obsessively: terms can change their meaning over time.
Step one of this project is going to be descriptive: let's look through the research literature for statements defining these terms. Let's add more terms as we find them. We should put some effort into finding first uses, but not obsessively: terms can change their meaning over time.
Remember, [http://freehaven.net/anonbib anonbib] is your friend.
Remember, [anonbib](http://freehaven.net/anonbib) is your friend.
== Kinds of designs, design techniques ==
## Kinds of designs, design techniques
=== High-latency vs Low-latency ===
### High-latency vs Low-latency
=== Mix, Mix-net ===
### Mix, Mix-net
This term was introduced in Chaum's "Untraceable electronic mail, return addresses, and digital pseudonyms" (1981), where it referred to a computer that detects and removes duplicates from a batch of incoming messages, decrypts each message in the batch with its private key, sorts them into lexicographical order, and delivers them to their recipients.
This term was introduced in Chaum's "Untraceable electronic mail, return addresses, and digital pseudonyms" (1981), where it referred to a computer that detects and removes duplicates from a batch of incoming messages, decrypts each message in the batch with its private key, sorts them into lexicographical order, and delivers them to their recipients.
=== Cascade ===
### Cascade
This term was introduced in Chaum's "Untraceable electronic mail, return addresses, and digital pseudonyms" (1981), where it referred to a series of mixes such that each mix would process a batch of messages before sending it to the next. Chaum1981 does not explicitly say that the cascade is assumed to be fixed; however, the message format it gives doesn't work in a non-fixed topology, since an address is only given for the final destination of each message.
This term was introduced in Chaum's "Untraceable electronic mail, return addresses, and digital pseudonyms" (1981), where it referred to a series of mixes such that each mix would process a batch of messages before sending it to the next. Chaum1981 does not explicitly say that the cascade is assumed to be fixed; however, the message format it gives doesn't work in a non-fixed topology, since an address is only given for the final destination of each message.
=== Free-route ===
### Free-route
=== Onion routing ===
### Onion routing
=== Onion ===
### Onion
=== Padding ===
### Padding
=== Batching ===
### Batching
=== Pooling, Pool ===
### Pooling, Pool
== Kinds of attacks ==
## Kinds of attacks
=== Predecessor attack ===
### Predecessor attack
=== Correlation attack ===
### Correlation attack
=== Intersection attack ===
### Intersection attack
=== Tagging attack ===
### Tagging attack
=== N-1 attack ===
### N-1 attack
== Related Work ==
## Related Work
Pfitzmann and Hansen have a must-read terminology proposal, "Anonymity, Unlinkability, Undetectability, Unobservability,
Pfitzmann and Hansen have a must-read terminology proposal, "Anonymity, Unlinkability, Undetectability, Unobservability,
Pseudonymity, and Identity Management – A Consolidated Proposal for Terminology," [[http://dud.inf.tu-dresden.de/Anon_Terminology.shtml|now at version 0.31]]. This paper focuses on terminology for ''properties'' provided (or not provided) by anonymity, pseudonymity, privacy, and identity systems. This project, instead, aims to provide consistent terminology for ''techniques'' used to make these systems (and to attack them).
Pseudonymity, and Identity Management – A Consolidated Proposal for Terminology," [[at version 0.31](http://dud.inf.tu-dresden.de/Anon_Terminology.shtml|now)]. This paper focuses on terminology for _properties_ provided (or not provided) by anonymity, pseudonymity, privacy, and identity systems. This project, instead, aims to provide consistent terminology for _techniques_ used to make these systems (and to attack them).
(In other words, don't go adding terms from the Pfitzmann and Hansen paper.)
(In other words, don't go adding terms from the Pfitzmann and Hansen paper.)