Font Size: a A A

The Research On The Describe Model And Security Of Mix Anonymous Communication Mechanism

Posted on:2007-02-03Degree:MasterType:Thesis
Country:ChinaCandidate:L ChengFull Text:PDF
GTID:2178360185985766Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
As the tool of spreading information,Internet is widely used.In many field such as E-voting, E-commerce,especially in the establishment,hiding ID is a basic demand.Therefore,people rise the research to the technology of anonymous communication and its security.With the various and in-depth attack mode, the technology of anonymous communication has developed for more than 20 years.It has comed into being many anonymous ideas , technologies and practical systems based on Chaum's MIX idea.But all of them can not defend all the attacks,especially the classical active attack——the n-1 attack.This kind of attack is the principal threat of anonymous systems based on the MIX idea.First,this dissertation summarizes the actuality of anonymous commun-ication, brings forward a characterization model based on five elements by analyzing and inducing the internal application policies of existing MIX policies, analyses the characteristic of this model and indicates the application method of the model.It can be used for classifying the MIXes . Applying this character-ization model indicates the basic frame and clear path for improving existing MIX policyes and bringing forward new MIX policies.Second,we quantitatively analyse the expense of the n-1 attack to classical MIX policies and the effect that introduce some randomicity to the MIX policies by the characterization model.We compared the security of classical MIX policies at the angle of the expense of the n-1 attack.By this compare,people know that what idiographic MIXes should use in the different conditions. In the end,we designed and implemented three course simulators of the n-1 attack to three classical MIX policies.With the data that obtained from the simulators,we validated the central conclusions that obtained from the quanti-tatively analyzing to the expense of the n-1 attack.
Keywords/Search Tags:anonymous communication, MIX, active attack, n-1 attack
PDF Full Text Request
Related items