skip to main content
10.1145/1314333.1314347acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Does additional information always reduce anonymity?

Published:29 October 2007Publication History

ABSTRACT

We discuss information-theoretic anonymity metrics, that use entropy over the distribution of all possible recipients to quantify anonymity. We identify a common misconception: the entropy of the distribution describing the potentialreceivers does not always decrease given more information.We show the relation of these a-posteriori distributions with the Shannon conditional entropy, which is an average overall possible observations.

References

  1. Dakshi Agrawal and Dogan Kesdogan. Measuring anonymity: The disclosure attack. IEEE Security & Privacy, 1(6):27--34, 2003.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. David Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2):84--88, 1981. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Sebastian Clauß. A framework for quantification of linkability within a privacy-enhancing identity management system. In Emerging Trends in Information and Communication Security, pages 191--205. Springer, LNCS 3995, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Sebastian Clauß and Stefan Schiffner. Structuring anonymity metrics. Proceedings of the ACM Workshop on Digital Identity Management, pages 55--62, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. George Danezis. Statistical disclosure attacks: Traffic conformation in open environments. In Proceedings of Security and Privacy in the Age of Uncertainty, (SEC2003), pages 421--426. Kluwer, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  6. George Danezis and Andrei Serjantov. Statistical disclosure or intersection attacks on anonymity systems. In Information Hiding, pages 293--308. Springer, LNCS 3200, 2004.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Claudia Diaz, Joris Claessens, Stefaan Seys, and Bart Preneel. Information theory and anonymity. In B. Macq and J.-J. Quisquater, editors, Werkgemeenschap voor Informatie en Communicatietheorie, pages 179--186, 2002.Google ScholarGoogle Scholar
  8. Claudia Diaz and Bart Preneel. Reasoning about the anonymity provided by pool mixes that generate dummy traffic. In Information Hiding, pages 309--325. Springer, LNCS 3200, 2004.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Claudia Diaz and Andrei Serjantov. Generalising mixes. In Designing Privacy Enhancing Technologies, Proceedings of PET'03, pages 18--31. Springer-Verlag, LNCS 2760, 2003.Google ScholarGoogle Scholar
  10. Claudia Diaz, Stefaan Seys, Joris Claessens, and Bart Preneel. Towards measuring anonymity. In Designing Privacy Enhancing Technologies, Proceedings of PET'02, pages 54--68. Springer-Verlag, LNCS 2482, 2002.Google ScholarGoogle Scholar
  11. Dogan Kesdogan and Lexi Pimenidis. The hitting set attack on anonymity protocols. In Information Hiding, pages 326--339. Springer, LNCS 3200, 2004.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Nick Mathewson and Roger Dingledine. Practical traffic analysis: Extending and resisting statistical disclosure. In Privacy Enhancing Technologies, pages 17--34. Springer, LNCS 3424, 2004.Google ScholarGoogle Scholar
  13. Andreas Pfitzmann and Marit Hansen. Anonymity, unobservability and pseudonymity - a proposal for terminology. In Designing Privacy Enhancing Technologies, Proceedings of PET'00, pages 1--9. Springer-Verlag, LNCS 2009, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Alfred Rényi. On measures of entropy and information. Proceedings of the Fourth Berkeley Symposium Mathematical Statistics and Probability, 1:547--561, 1961.Google ScholarGoogle Scholar
  15. Andrei Serjantov and George Danezis. Towards an information theoretic metric for anonymity. In Designing Privacy Enhancing Technologies, Proceedings of PET'02, pages 41--53. Springer-Verlag, LNCS 2482, 2002.Google ScholarGoogle Scholar
  16. Claude Shannon. A mathematical theory of communication. The Bell System Technical Journal, 27:379--423:623--656, 1948.Google ScholarGoogle ScholarCross RefCross Ref
  17. Sandra Steinbrecher and Stefan KÄopsell. Modelling unlinkability. In Designing Privacy Enhancing Technologies, Proceedings of PET'03, pages 32--47. Springer-Verlag, LNCS 2760, 2003.Google ScholarGoogle Scholar
  18. Gergely Tóth, Zoltán Hornák, and Ferenc Vajda. Measuring anonymity revisited. In Proceedings of the Ninth Nordic Workshop on Secure IT Systems, pages 85--90, 2004.Google ScholarGoogle Scholar

Index Terms

  1. Does additional information always reduce anonymity?

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        WPES '07: Proceedings of the 2007 ACM workshop on Privacy in electronic society
        October 2007
        116 pages
        ISBN:9781595938831
        DOI:10.1145/1314333
        • General Chair:
        • Peng Ning,
        • Program Chair:
        • Ting Yu

        Copyright © 2007 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 29 October 2007

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        Overall Acceptance Rate106of355submissions,30%

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader