Abstract
Our position is that incentives are fundamental to anonymous communications and censorship resistance; they have been largely forgotten in practice despite being investigated on many occasions over the years. A history of the need for incentives in anonymous communication networks is given, and discussed in the context of deployed networks. We consider privacy from an economic perspective of supply and demand: First, there has to be servers that supply computational power needed to privacy-enhance traffic in return for rewards; second, there needs to be paying users to create the demand to provision those rewards. We present twin hypotheses that run counter to much of the current research in anonymous communication networks such as Tor as well as censorship resistance: the use of a tokenized incentives will create a population of servers to supply anonymity while users in countries such as China can adapt protocols where decentralization powers the demand for uncensored network access. Finally, we sketch how the Nym mixnet is exploring these hypotheses.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
This proposal led to a flurry of coding work, with Adam Back coding the first attempt http://www.cypherspace.org/eternity/.
- 2.
- 3.
The technical details of the incentive scheme are out of scope of this paper but available [6].
References
Anderson, R., et al.: The eternity service. In Proc. PRAGOCRYPT 96, 242–252 (1996)
Brunton, F., Nissenbaum, H.: Obfuscation: A User’s Guide for Privacy and Protest. MIT Press (2015)
Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84–88 (1981)
Danezis, G., Dingledine, R., Mathewson, N.: Mixminion: design of a type iii anonymous remailer protocol. In: 2003 Symposium on Security and Privacy, 2003, pp. 2–15. IEEE (2003)
Diaz, C., Halpin, H., Kiayias, A.: The Next-Generation of Privacy Infrastructure. The Nym Network (2021)
Diaz, C., Halpin, H., Kiayias, A.: Reward-Sharing for Mixnets. MIT Cryptoeconomic Systems, vol. 2, no. 1 (2022)
Dingledine, R., Freedman, M.J., Hopwood, D., Molnar, D.: A reputation system to increase MIX-net reliability. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 126–141. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45496-9_10
Dingledine, R., Freedman, M.J., Molnar, D.: The free haven project: distributed anonymous storage service. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 67–95. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-44702-4_5
Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. Technical report, Naval Research Lab Washington DC (2004)
Dingledine, R., Syverson, P.: Reliable MIX cascade networks through reputation. In: Blaze, M. (ed.) FC 2002. LNCS, vol. 2357, pp. 253–268. Springer, Heidelberg (2003). https://doi.org/10.1007/3-540-36504-4_18
Franz, E., Jerichow, A., Wicke, G.: A payment scheme for mixes providing anonymity. In: Lamersdorf, W., Merz, M. (eds.) TREC 1998. LNCS, vol. 1402, pp. 94–108. Springer, Heidelberg (1998). https://doi.org/10.1007/BFb0053404
Goldberg, I., Shostack, A.: Freedom network 1.0 architecture and protocols. Zero-Knowledge Systems White Paper (1999)
Huang, H.-Y., Bashir, M.: The onion router: understanding a privacy enhancing technology community. Proc. Assoc. Inf. Sci. Technol. 53(1), 1–10 (2016)
Johnny Ngan, T.-W., Dingledine, R., Wallach, D.S.: Building Incentives into Tor. In: Sion, R. (ed.) FC 2010. LNCS, vol. 6052, pp. 238–256. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-14577-3_19
Reiter, M.K., Wang, X.F., Wright, M.: Building reliable mix networks with fair exchange. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 378–392. Springer, Heidelberg (2005). https://doi.org/10.1007/11496137_26
Wilcox-O’Hearn, B.: Experiences deploying a large-scale emergent network. In: Druschel, P., Kaashoek, F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 104–110. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-45748-8_10
Winter, P., Pulls, T., Fuss, J.: ScrambleSuit: a polymorphic network protocol to circumvent censorship. In Proceedings of the 12th ACM Workshop on Workshop on Privacy in the Electronic Society, pp. 213–224 (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Halpin, H., Serjantov, A. (2023). Incentives and Censorship Resistance for Mixnets Revisited. In: Stajano, F., Matyáš, V., Christianson, B., Anderson, J. (eds) Security Protocols XXVIII. Security Protocols 2023. Lecture Notes in Computer Science, vol 14186. Springer, Cham. https://doi.org/10.1007/978-3-031-43033-6_7
Download citation
DOI: https://doi.org/10.1007/978-3-031-43033-6_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-43032-9
Online ISBN: 978-3-031-43033-6
eBook Packages: Computer ScienceComputer Science (R0)