Skip to main content

gap – Practical Anonymous Networking

  • Conference paper
Privacy Enhancing Technologies (PET 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2760))

Included in the following conference series:

Abstract

This paper describes how anonymity is achieved in gnunet, a framework for anonymous distributed and secure networking.

The main focus of this work is gap, a simple protocol for anonymous transfer of data which can achieve better anonymity guarantees than many traditional indirection schemes and is additionally more efficient. gap is based on a new perspective on how to achieve anonymity. Based on this new perspective it is possible to relax the requirements stated in traditional indirection schemes, allowing individual nodes to balance anonymity with efficiency according to their specific needs.

Portions of this work were supported by sponsors of CERIAS.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bennett, K., Grothoff, C., Horozov, T., Patrascu, I.: Efficient Sharing of Encrypted Data. In: Batten, L.M., Seberry, J. (eds.) ACISP 2002. LNCS, vol. 2384, p. 107. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  2. Castro, M., Druschel, P., Hu, Y., Rowstron, A.: Exploiting network proximity in distributed hash tables. In: Proceedings of the International Workshop on Future Directions in Distributed Computing (2002)

    Google Scholar 

  3. Chaum, D.: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM 24(2), 84–88 (1981)

    Article  Google Scholar 

  4. Chaum, D.: The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability. Journal of Cryptography, 65–75 (1988)

    Google Scholar 

  5. Clarke, I., Sandberg, O., Wiley, B., Hong, T.W.: Freenet: A Distributed Anonymous Information Storage and Retrieval System. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, p. 46. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  6. Danezis, G., Dingledine, R., Mathewson, N.: Mixminion: Design of a Type III Anonymous Remailer Protocol. In: IEEE Symposium on Security and Privacy (2003)

    Google Scholar 

  7. Diaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 54–68. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  8. Ferreira, R.A., Grothoff, C., Ruth, P.: A transport layer abstraction for peer-to-peer networks. In: Proceedings of GP2PC 2003. IEEE Computer Society Press, Los Alamitos (2003)

    Google Scholar 

  9. Freedman, M.J., Morris, R.: Tarzan: A Peer-to-Peer Anonymizing Network Layer. In: Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS 2002), Washington, D.C. (2002)

    Google Scholar 

  10. Grothoff, C.: An Excess-Based Economic Model for Resource Allocation in Peer-to-Peer Networks. Wirtschaftsinformatik (June 2003)

    Google Scholar 

  11. Kennell, R.: Proving the Authenticity of a Remote Microprocessor (2003)

    Google Scholar 

  12. Reed, M., Syverson, P., Goldschlag, D.: Proxies for anonymous routing. In: 12th Annual Computer Security Applications Conference, December 1995, pp. 95–104 (1995)

    Google Scholar 

  13. Reiter, M.K., Rubin, A.D.: Crowds: anonymity for Web transactions. ACM Transactions on Information and System Security 1(1), 66–92 (1998)

    Article  Google Scholar 

  14. Rennhard, M., Plattner, B.: Introducing MorphMix: Peer-to-Peer based Anonymous Internet Usage with Collusion Detection. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES), in association with 9th ACM Conference on Computer and Communications Security (CCS 2002), Washington, DC, USA (November 2002)

    Google Scholar 

  15. Rowstron, A., Druschel, P.: Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems. In: Guerraoui, R. (ed.) Middleware 2001. LNCS, vol. 2218, p. 329. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  16. Scarlata, V., Levine, B., Shields, C.: Responder anonymity and anonymous peer-to-peer file sharing. In: Proceedings of IEEE International Conference on Network Protocols, ICNP 2001 (2001)

    Google Scholar 

  17. Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 41–53. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  18. Sherwood, R., Bhattacharjee, B., Srinivasan, A.: P5: A Protocol for Scalable Anonymous Communication. In: IEEE Symposium on Security and Privacy (2002)

    Google Scholar 

  19. Shields, C., Levine, B.N.: A protocol for anonymous communication over the Internet. In: ACM Conference on Computer and Communications Security, pp. 33–42 (2000)

    Google Scholar 

  20. Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., Balakrishnan, H.: Chord: A scalable peer-to-peer lookup service for internet applications. In: Proceedings of the 2001 conference on applications, technologies, architectures, and protocols for computer communications, pp. 149–160. ACM Press, New York (2001)

    Chapter  Google Scholar 

  21. Syverson, P., Goldschlag, D., Reed, M.: Anonymous Connections and Onion Routing. In: IEEE Symposium on Security and Privacy, Oakland, California, 4–7, pp. 44–54 (1997)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bennett, K., Grothoff, C. (2003). gap – Practical Anonymous Networking. In: Dingledine, R. (eds) Privacy Enhancing Technologies. PET 2003. Lecture Notes in Computer Science, vol 2760. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-40956-4_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-40956-4_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-20610-1

  • Online ISBN: 978-3-540-40956-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics