AOT: Anonymization by Oblivious Transfer
dc.contributor.author | Javani, Farid | |
dc.contributor.author | Sherman, Alan T. | |
dc.date.accessioned | 2021-06-11T16:42:34Z | |
dc.date.available | 2021-06-11T16:42:34Z | |
dc.date.issued | 2021-05-22 | |
dc.description.abstract | We introduce AOT, an anonymous communication system based on mix network architecture that uses oblivious transfer (OT) to deliver messages. Using OT to deliver messages helps AOT resist blending (n−1) attacks and helps AOT preserve receiver anonymity, even if a covert adversary controls all nodes in AOT. AOT comprises three levels of nodes, where nodes at each level perform a different function and can scale horizontally. The sender encrypts their payload and a tag, derived from a secret shared between the sender and receiver, with the public key of a Level-2 node and sends them to a Level-1 node. On a public bulletin board, Level-3 nodes publish tags associated with messages ready to be retrieved. Each receiver checks the bulletin board, identifies tags, and receives the associated messages using OT. A receiver can receive their messages even if the receiver is offline when messages are ready. Through what we call a "handshake" process, communicants can use the AOT protocol to establish shared secrets anonymously. Users play an active role in contributing to the unlinkability of messages: periodically, users initiate requests to AOT to receive dummy messages, such that an adversary cannot distinguish real and dummy requests. | en_US |
dc.description.sponsorship | We thank David Chaum and Jonathan Katz for helpful comments. Sherman was supported in part by the National Science Foundation under SFS grant DGE-1753681, and by the U.S. Department of Defense under CySP grants H98230-19- 1-0308 and H98230-20-1-0384. | en_US |
dc.description.uri | https://arxiv.org/abs/2105.10794 | en_US |
dc.format.extent | 20 pages | en_US |
dc.genre | journal articles | en_US |
dc.genre | preprints | |
dc.identifier | doi:10.13016/m25s0v-5tbc | |
dc.identifier.uri | http://hdl.handle.net/11603/21730 | |
dc.identifier.uri | https://doi.org/10.48550/arXiv.2105.10794 | |
dc.language.iso | en_US | en_US |
dc.relation.isAvailableAt | The University of Maryland, Baltimore County (UMBC) | |
dc.relation.ispartof | UMBC Computer Science and Electrical Engineering Department Collection | |
dc.relation.ispartof | UMBC Faculty Collection | |
dc.rights | This item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author. | |
dc.rights | Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) | |
dc.rights.uri | https://creativecommons.org/licenses/by-nc-sa/4.0/ | |
dc.subject | UMBC Cyber Defense Lab | en_US |
dc.title | AOT: Anonymization by Oblivious Transfer | en_US |
dc.type | Text | en_US |