User Tools

Site Tools


Block Lectures on Anonymity

Dr. Stefan Köpsell (TU Dresden)

  • Tuesday, 28 March 2017, 18:00, C308 (Faculty of Computer Science, C Building, UAIC)—map
  • Thursday, 30 March 2017, 16:00, C411 (Faculty of Computer Science, C Building, UAIC)—map
  • Friday, 31 March 2017, 18:00, C308 (Faculty of Computer Science, C Building, UAIC)—map

Contents Summary

The lectures give an introduction into methods and techniques for unobservable and anonymous communications in computer networks. The basic principles will be explained and exemplified. More specific the following schemes will be discussed: DC-Net, Mixes, Private Message Service. It will be explained how this schemes are used in real-world systems like Tor or I2P. Besides anonymity and unobservability on the network layer, techniques for anonymity and pseudonymity on the application layer will be explained. The related principles will be illustrated using digital means of payment and value exchange as example.

Contents are structured as following:

Part I (28 March):

  • Introduction into the field of privacy enhancing technologies
    • Motivation
    • Overall goals
    • Specific protection goals
    • Attacker models
  • Broadcast as basic building block for recipient anonymity
    • Implicit addressing
    • Attacks and Limitations
  • Private Message Service / Private Information Retrieval
    • Basic scheme based on distributed databases
    • Performance enhancements
  • DC-Networks
    • Basic design principles
    • DC+-Net: security enhanced DC-Net

Part II (30 March):

  • Mixes for relationship anonymity
    • Basic scheme for sender anonymity
    • Recipient anonymity
  • Practical Onion-Routing: Tor
    • Strengths and Limitations
    • Hidden Services
  • Anonymous messaging: Vuvuzela

Part III (31 March):

  • Applications on top of anonymous communication
    • Digital pseudonyms
    • Anonymous credentials
    • Privacy-enhancing identity management
    • Privacy respecting value exchange
    • Anonymous payment

Back to EBSIS Events section.