Skip to main content

Incentives and Censorship Resistance for Mixnets Revisited

  • Conference paper
  • First Online:
Security Protocols XXVIII (Security Protocols 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14186))

Included in the following conference series:

  • 167 Accesses

Abstract

Our position is that incentives are fundamental to anonymous communications and censorship resistance; they have been largely forgotten in practice despite being investigated on many occasions over the years. A history of the need for incentives in anonymous communication networks is given, and discussed in the context of deployed networks. We consider privacy from an economic perspective of supply and demand: First, there has to be servers that supply computational power needed to privacy-enhance traffic in return for rewards; second, there needs to be paying users to create the demand to provision those rewards. We present twin hypotheses that run counter to much of the current research in anonymous communication networks such as Tor as well as censorship resistance: the use of a tokenized incentives will create a population of servers to supply anonymity while users in countries such as China can adapt protocols where decentralization powers the demand for uncensored network access. Finally, we sketch how the Nym mixnet is exploring these hypotheses.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 49.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    This proposal led to a flurry of coding work, with Adam Back coding the first attempt http://www.cypherspace.org/eternity/.

  2. 2.

    https://support.torproject.org/censorship/connecting-from-china/.

  3. 3.

    The technical details of the incentive scheme are out of scope of this paper but available [6].

References

  1. Anderson, R., et al.: The eternity service. In Proc. PRAGOCRYPT 96, 242–252 (1996)

    Google Scholar 

  2. Brunton, F., Nissenbaum, H.: Obfuscation: A User’s Guide for Privacy and Protest. MIT Press (2015)

    Google Scholar 

  3. Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84–88 (1981)

    Article  Google Scholar 

  4. Danezis, G., Dingledine, R., Mathewson, N.: Mixminion: design of a type iii anonymous remailer protocol. In: 2003 Symposium on Security and Privacy, 2003, pp. 2–15. IEEE (2003)

    Google Scholar 

  5. Diaz, C., Halpin, H., Kiayias, A.: The Next-Generation of Privacy Infrastructure. The Nym Network (2021)

    Google Scholar 

  6. Diaz, C., Halpin, H., Kiayias, A.: Reward-Sharing for Mixnets. MIT Cryptoeconomic Systems, vol. 2, no. 1 (2022)

    Google Scholar 

  7. Dingledine, R., Freedman, M.J., Hopwood, D., Molnar, D.: A reputation system to increase MIX-net reliability. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 126–141. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45496-9_10

    Chapter  Google Scholar 

  8. Dingledine, R., Freedman, M.J., Molnar, D.: The free haven project: distributed anonymous storage service. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 67–95. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-44702-4_5

    Chapter  Google Scholar 

  9. Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. Technical report, Naval Research Lab Washington DC (2004)

    Book  Google Scholar 

  10. Dingledine, R., Syverson, P.: Reliable MIX cascade networks through reputation. In: Blaze, M. (ed.) FC 2002. LNCS, vol. 2357, pp. 253–268. Springer, Heidelberg (2003). https://doi.org/10.1007/3-540-36504-4_18

    Chapter  Google Scholar 

  11. Franz, E., Jerichow, A., Wicke, G.: A payment scheme for mixes providing anonymity. In: Lamersdorf, W., Merz, M. (eds.) TREC 1998. LNCS, vol. 1402, pp. 94–108. Springer, Heidelberg (1998). https://doi.org/10.1007/BFb0053404

    Chapter  Google Scholar 

  12. Goldberg, I., Shostack, A.: Freedom network 1.0 architecture and protocols. Zero-Knowledge Systems White Paper (1999)

    Google Scholar 

  13. Huang, H.-Y., Bashir, M.: The onion router: understanding a privacy enhancing technology community. Proc. Assoc. Inf. Sci. Technol. 53(1), 1–10 (2016)

    Google Scholar 

  14. Johnny Ngan, T.-W., Dingledine, R., Wallach, D.S.: Building Incentives into Tor. In: Sion, R. (ed.) FC 2010. LNCS, vol. 6052, pp. 238–256. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-14577-3_19

    Chapter  Google Scholar 

  15. Reiter, M.K., Wang, X.F., Wright, M.: Building reliable mix networks with fair exchange. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 378–392. Springer, Heidelberg (2005). https://doi.org/10.1007/11496137_26

    Chapter  Google Scholar 

  16. Wilcox-O’Hearn, B.: Experiences deploying a large-scale emergent network. In: Druschel, P., Kaashoek, F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 104–110. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-45748-8_10

    Chapter  Google Scholar 

  17. Winter, P., Pulls, T., Fuss, J.: ScrambleSuit: a polymorphic network protocol to circumvent censorship. In Proceedings of the 12th ACM Workshop on Workshop on Privacy in the Electronic Society, pp. 213–224 (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Harry Halpin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Halpin, H., Serjantov, A. (2023). Incentives and Censorship Resistance for Mixnets Revisited. In: Stajano, F., Matyáš, V., Christianson, B., Anderson, J. (eds) Security Protocols XXVIII. Security Protocols 2023. Lecture Notes in Computer Science, vol 14186. Springer, Cham. https://doi.org/10.1007/978-3-031-43033-6_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-43033-6_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-43032-9

  • Online ISBN: 978-3-031-43033-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics