This is a collection of research material related to Mixnets and Anonymous Communication Networks (ACN) that is a part of a wider effort of research for a default transaction building method for Grin. The list is non-exhaustive, focuses on recent advances that are relevant in the context of Grin, and doesn't include more classical work.
🔥: Recommended in particular in our context
Title | Author(s) | Year | Related info |
---|---|---|---|
Why I'm not an entropist | Syverson | 2009 | |
A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management v0.34 | Pfitzmann & Hansen | 2010 |
Title | Author(s) | Year | Related info |
---|---|---|---|
🔥 Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency—Choose Two | Das, Meiser, Mohammadi, Kate | 2018 | |
Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and Deployments | Troncoso, Isaakidis, Danezis, Halpin | 2017 | |
Impact of Network Topology on Anonymity and Overhead in Low-Latency Anonymity Networks | Diaz, Murdoch, Troncoso | 2010 | |
A Survey of Anonymous Communication Channels | Danezis & Diaz | 2008 | |
On Privacy Notions in Anonymous Communication | Kuhn, Beck, Schiffner, Jorswieck, Strufe | 2019 | |
A Survey on Measuring Anonymity in Anonymous Communication Systems | Lu, Du, Wang | 2019 |
Title | Author(s) | Year | Related info |
---|---|---|---|
🔥Sphinx: A Compact and Provably Secure Mix Format | Danezis & Goldberg | 2009 | |
Using Sphinx to Improve Onion Routing Circuit Construction (short paper) | Kate & Goldberg | 2010 |
Title | Author(s) | Year | Related info |
---|---|---|---|
🔥 Multiparty Routing: Secure Routing for Mixnets | Shirazi, Andreeva, Kohlweiss, Diaz | 2017 | |
🔥 A Survey on Routing in Anonymous Communication Protocols | Shirazi, Simeonowski, Asghar, Backes, Diaz | 2018 | |
🔥 Alpenhorn: Bootstrapping Secure Communication Without Leaking Metadata | Lazar & Zeldovich | 2016 |
Title | Author(s) | Year | Related info |
---|---|---|---|
🔥 Limits of Anonymity in Open Environments | Kedogan, Agrawal, Penz | 2002 | |
🔥An Empirical Study of the I2P Anonymity Network and its Censorship Resistance | Hoang, Antonakakis, Kintis, Polychronakis | 2018 | |
🔥Anonymity Services Tor, I2P, JonDonym: Classifying in the Dark (Web) | Montieri, Ciuonzo, Aceto, Pescapé | 2018 | |
Sleeping dogs lie on a bed of onions but wake when mixed | Syverson | 2011 | |
Using Linkability Information to Attack Mix-Based Anonymity Services | Schiffner & Clauß | 2009 | |
Statistical Disclosure Attacks on Anonymity Systems | Danezis & Serjantov | 2004 | |
Statistical Disclosure Attacks: Traffic Confirmation in Open Environments | Danezis | 2003 | |
Analysis of Fingerprinting Techniques for Tor Hidden Services | Panchenko, Mitseva, Henze, Lanze, Wehrle, Engel | 2017 | |
Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems | Back, Möller, Stiglic | 2001 | |
No Right to Remain Silent: Isolating Malicious Mixes | Leibowitz, Piotrowska, Danezis, Herzberg | 2019 |
Title | Author(s) | Year | Related info |
---|---|---|---|
Privately (and Unlinkably) Exchanging Messages Using a Public Bulletin Board | Hoepman | 2015 | |
A Private and Unlinkable Message Exchange Using a Public bulletin board in Opportunistic Networks | Farkhondeh | 2019 | |
Simple and Efficient Approach for Achieving End-to-End Anonymous Communication | Jiang, Bowers, Lin | 2019 |
Title | Author(s) | Year | Related info |
---|---|---|---|
The Pynchon Gate | Sassaman, Cohen, Mathewson | 2005 |
Title | Author(s) | Year | Related info |
---|---|---|---|
Fundamental Design Issues in Anonymous Peer-to-peer Distributed Hash Table Protocols | Baumeister | 2019 |
Pull requests are welcomed! Help propose research to add to the list and help with the grouping and analysis. 💟