Show simple item record

dc.contributor.authorJAKOBSEN, SKen_US
dc.contributor.editorKeevash, Pen_US
dc.contributor.editorRiis, Sen_US
dc.date.accessioned2017-05-22T15:44:16Z
dc.date.issued2016-01-18en_US
dc.date.submitted2017-01-11T14:23:30.135Z
dc.identifier.urihttp://qmro.qmul.ac.uk/xmlui/handle/123456789/23264
dc.descriptionPhDen_US
dc.description.abstractThe usual methods of getting anonymity, such as using a VPN or the Tor network, requires some amount of trust: You have to either trust a particular server or trust that not too many servers in a network have been corrupted. In this thesis, we will explore how much we can do without this assumption. Throughout the thesis we will assume that there is an adversary who can see all messages sent, that no two people have access to shared randomness and for much of the thesis we further assume that the adversary has unbounded computational power. In this case, it is impossible for one or more leakers to send any information without revealing some information about who they are. We defi ne a measure of suspicion, which captures the anonymity loss of revealing information in this model: to reveal one bit of information, you will, in expectation, have to become one bit more suspicious. This measure is used to compute the exact amount of information a group of leakers can reveal if they want to keep reasonable doubt about who the leakers are. We also get exact results for the case where some people, censors, are trying to obstruct the leakage by sending misleading messages. The main result in these models is that (even without censors) the leakers can only reveal a very small amount of information. However, the protocols shown to exists might still be a useful alternative to warrant canaries. We also consider the case where the adversary has bounded computational power. In this model, we show that it is still impossible for one leaker to reveal information without losing some anonymity. However, if we give the leaker access to a small anonymous channel, she can use this, combined with steganography, to reveal a large amount of information anonymously.en_US
dc.language.isoenen_US
dc.rightsThe copyright of this thesis rests with the author and no quotation from it or information derived from it may be published without the prior written consent of the author
dc.subjectcryptogenographyen_US
dc.subjectanonymous steganographyen_US
dc.titleCryptogenography: Anonymity without trusten_US
pubs.notesNo embargoen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

  • Theses [4114]
    Theses Awarded by Queen Mary University of London

Show simple item record