Accountable Anonymous Group Messaging

Reading time: 6 minute
...

📝 Original Info

  • Title: Accountable Anonymous Group Messaging
  • ArXiv ID: 1004.3057
  • Date: 2010-04-20
  • Authors: Researchers from original ArXiv paper

📝 Abstract

Users often wish to participate in online groups anonymously, but misbehaving users may abuse this anonymity to spam or disrupt the group. Messaging protocols such as Mix-nets and DC-nets leave online groups vulnerable to denial-of-service and Sybil attacks, while accountable voting protocols are unusable or inefficient for general anonymous messaging. We present the first general messaging protocol that offers provable anonymity with accountability for moderate-size groups, and efficiently handles unbalanced loads where few members have much data to transmit in a given round. The N group members first cooperatively shuffle an NxN matrix of pseudorandom seeds, then use these seeds in N "pre-planned" DC-nets protocol runs. Each DC-nets run transmits the variable-length bulk data comprising one member's message, using the minimum number of bits required for anonymity under our attack model. The protocol preserves message integrity and one-to-one correspondence between members and messages, makes denial-of-service attacks by members traceable to the culprit, and efficiently handles large and unbalanced message loads. A working prototype demonstrates the protocol's practicality for anonymous messaging in groups of 40+ member nodes.

💡 Deep Analysis

Deep Dive into Accountable Anonymous Group Messaging.

Users often wish to participate in online groups anonymously, but misbehaving users may abuse this anonymity to spam or disrupt the group. Messaging protocols such as Mix-nets and DC-nets leave online groups vulnerable to denial-of-service and Sybil attacks, while accountable voting protocols are unusable or inefficient for general anonymous messaging. We present the first general messaging protocol that offers provable anonymity with accountability for moderate-size groups, and efficiently handles unbalanced loads where few members have much data to transmit in a given round. The N group members first cooperatively shuffle an NxN matrix of pseudorandom seeds, then use these seeds in N “pre-planned” DC-nets protocol runs. Each DC-nets run transmits the variable-length bulk data comprising one member’s message, using the minimum number of bits required for anonymity under our attack model. The protocol preserves message integrity and one-to-one correspondence between members and messa

📄 Full Content

arXiv:1004.3057v1 [cs.CR] 18 Apr 2010 Accountable Anonymous Group Messaging UNPUBLISHED DRAFT Henry Corrigan-Gibbs Yale University Bryan Ford Yale University ABSTRACT Users often wish to participate in online groups anonymously, but misbehaving users may abuse this anonymity to spam or disrupt the group. Messaging protocols such as Mix-nets and DC-nets leave online groups vulnerable to denial-of-service and Sybil attacks, while accountable voting protocols are unusable or inefficient for general anonymous messaging. We present the first general messaging protocol that offers provable anonymity with accountability for moderate-size groups, and efficiently handles unbalanced loads where few members have much data to transmit in a given round. The N group members first cooperatively shuffle an N × N ma- trix of pseudorandom seeds, then use these seeds in N “pre- planned” DC-nets protocol runs. Each DC-nets run trans- mits the variable-length bulk data comprising one member’s message, using the minimum number of bits required for anonymity under our attack model. The protocol preserves message integrity and one-to-one correspondence between members and messages, makes denial-of-service attacks by members traceable to the culprit, and efficiently handles large and unbalanced message loads. A working prototype demonstrates the protocol’s practicality for anonymous mes- saging in groups of 40+ member nodes. 1. INTRODUCTION Anonymous participation is often considered a basic right in free societies [39]. The limited form of anonymity the that Internet provides is a widely cherished feature [33, 37] that enables people and groups with controversial or un- popular views to communicate and organize without fear of personal reprisal [30]. In spite of its benefits, anonymity makes it difficult to trace or exclude misbehaving partici- pants [10]. Online protocols providing stronger anonymity, such as mix-networks [7, 18] and DC-nets [8, 28, 36] further weaken accountability and yield forums in which no content may be considered trustworthy and no defense is available against anonymous misbehavior. This paper focuses on providing anonymous messaging within small, private online groups. We assume a group’s membership is closed and known to its members; creating groups with secret membership is a related but orthogonal goal [34]. Members may wish to send messages to each other, to the whole group, or to a non-member, such that the re- ceiver knows that some member sent the message but no one knows which member. Members may also wish to cast secret ballots in votes held by the group, or to create pseudonyms under which to collaborate with other members. We also wish to hold members accountable, however: not by compromising their anonymity and allowing some author- ity or majority quorum to unmask a member whose messages prove unpopular, but rather by ensuring that no malicious member can abuse his (strong) anonymity to disrupt the group’s operation. For example, a malicious member should be unable to corrupt or block other members’ messages, overrun the group with spam, stuffballots, or create un- limited anonymous Sybil identities [14] or sock puppets [32] with which to bias or subvert the group’s deliberations. As a motivating example, suppose an international group of journalists wishes to form a “whistleblowing” publication like WikiLeaks [38]. To protect journalists and their sources more strongly than the world’s varied legal frameworks do, member journalists wish to submit leaked documents and re- lated information to the group anonymously. Members need assurance that powerful organizations or governments can- not trace the leak to an individual journalist or her source. The journalists wish to prove to their readers that leaked documents come via a trustworthy channel, namely one of the group’s known and reputable members, and not from an outsider. The group must be able to analyze and vet each document thoroughly before collectively approving it for publication. The group must protect its internal opera- tion and its members’ anonymity even from adversaries who have planted colluding spies within the group. And this se- curity must come at acceptable time and resource costs. We present an accountable anonymous messaging pro- tocol called Dissent (Dining-cryptographers Shuffled-Send Network), the first we know of with the properties needed in scenarios like the one above. Dissent provides provable integrity, anonymity, and accountability in the face of strong traffic analysis and compromised members, and an experi- mental prototype shows it to be efficient enough for latency- tolerant messaging in small but widely distributed groups. In contrast with mix-networks [7, 18] and DC-nets [8, 28, 36], Dissent implements a shuffled send primitive, where each group member sends exactly one message per round, making it usable for voting or assigning pseudonyms with a 1-to-1 correspondence to real group members. Unlike verifi- able cryptographic shu

…(Full text truncated)…

Reference

This content is AI-processed based on ArXiv data.

Start searching

Enter keywords to search articles

↑↓
ESC
⌘K Shortcut