资源描述:
《anonymous internet access for the masses with morphmix》由会员上传分享,免费在线阅读,更多相关内容在教育资源-天天文库。
1、AnonymousInternetAccessfortheMasseswithMorphMixMarcRennhardSwissFederalInstituteofTechnology,ComputerEngineeringandNetworksLaboratory;Zurich,Switzerlandrennhard@tik.ee.ethz.chTechnicalReportTIK-Nr.159May,2003AbstractInthistechnicalreport,wepresenttheful
2、ldesign,averydetailedanalysis,andtheprotocolspecificationsofMorphMix,apeer-to-peerbasedmix-networktoenableanonymousInternetaccess.MorphMixovercomesthelimitsoftraditionalmix-networkswithoutintroducingnewdrawbacks.Inparticular,MorphMixfulfilsallrequirements
3、tosupportapotentiallyunlimitednumberofusersandtoprovidethemwithlowlatencyanonymousInternetaccess.1IntroductionMorphMix[31,32]isapeer-to-peerbasedmix-network[8]toenableanonymousInternetusage.Unliketraditionalstaticmix-networkssuchasMixmaster[9],OnionRout
4、ing[28],theFreedomNetwork[6],WebMixes[3],andtheAnonymityNetwork[34],MorphMixdoesnotconsistofarelativelysmallsetofdedicatedmixesthatservemanyusers.Rather,everyMorphMixuserisalsoamixatthesametime.InMorphMix,nodescanjoinandleaveatanymomentandwethereforecal
5、lpeer-to-peerbasedapproachesdynamicmix-networks.Otherexamplesofdynamicmix-networksareCrowds[29]andTarzan[21].ThemainmotivationforMorphMixistoprovidelow-latencyanonymousInternetaccessforthemasses,i.e.formillionsofusers.Staticmix-networks–operatedcommerci
6、allyornot–arenotwellsuitedtofulfilthistask[33]:theexperiencewiththecommercialFreedomnetworkhasshownitisdifficulttooperatesuchasysteminaprofitablewayandstaticmix-networksmadeupofvolunteersrunningamixmayfailtoacquireenoughmixesforcostreasonsandduetopotential
7、politicalandlegalpressure.Ingeneral,smallstaticmix-networkssufferfromtheproblemthatanadversarycantrytooperateasignificantportionofallmixeshimself.Consequently,theonlywaythatmix-networkscomposedofmixesoperatedbyvolunteersaresecureagainstawell-fundedadvers
8、arytryingtooperateseveralmixesinthesystemistomakesurethatthenumberofhonestmixesissohighthattheattackgetstooexpensive.MorphMixdoesnotintendtoprovideperfectanonymity.Infact,consideringtheasynchronousna-tureoftheInternetandpowerfula