[ietf-privacy] 答复: RE: anonymity definition in"draft-hansen-privacy-terminology-03"

zhou.sujing@zte.com.cn Thu, 09 February 2012 07:49 UTC

Return-Path: <zhou.sujing@zte.com.cn>
X-Original-To: ietf-privacy@ietfa.amsl.com
Delivered-To: ietf-privacy@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4AC2621E8014 for <ietf-privacy@ietfa.amsl.com>; Wed, 8 Feb 2012 23:49:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -94.937
X-Spam-Level:
X-Spam-Status: No, score=-94.937 tagged_above=-999 required=5 tests=[AWL=-3.947, BAYES_00=-2.599, CHARSET_FARAWAY_HEADER=3.2, HTML_MESSAGE=0.001, J_CHICKENPOX_15=0.6, J_CHICKENPOX_23=0.6, J_CHICKENPOX_51=0.6, MIME_8BIT_HEADER=0.3, MIME_BASE64_TEXT=1.753, MIME_CHARSET_FARAWAY=2.45, RCVD_DOUBLE_IP_LOOSE=0.76, SARE_SUB_ENC_GB2312=1.345, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id x7bcLmmJJZhu for <ietf-privacy@ietfa.amsl.com>; Wed, 8 Feb 2012 23:49:44 -0800 (PST)
Received: from mx5.zte.com.cn (mx6.zte.com.cn [95.130.199.165]) by ietfa.amsl.com (Postfix) with ESMTP id D9EB721E8013 for <ietf-privacy@ietf.org>; Wed, 8 Feb 2012 23:49:43 -0800 (PST)
Received: from [10.30.17.100] by mx5.zte.com.cn with surfront esmtp id 56690753685861; Thu, 9 Feb 2012 15:22:26 +0800 (CST)
Received: from [10.30.3.20] by [192.168.168.16] with StormMail ESMTP id 46026.1669614826; Thu, 9 Feb 2012 15:49:21 +0800 (CST)
Received: from notes_smtp.zte.com.cn ([10.30.1.239]) by mse01.zte.com.cn with ESMTP id q197nTnJ004946; Thu, 9 Feb 2012 15:49:29 +0800 (GMT-8) (envelope-from zhou.sujing@zte.com.cn)
In-Reply-To: <999913AB42CC9341B05A99BBF358718D0115994F@FIESEXC035.nsn-intra.net>
To: "Tschofenig, Hannes (NSN - FI/Espoo)" <hannes.tschofenig@nsn.com>
MIME-Version: 1.0
X-Mailer: Lotus Notes Release 6.5.6 March 06, 2007
Message-ID: <OFE172B3DA.E9624A10-ON4825799F.0029DA3D-4825799F.002AFCAE@zte.com.cn>
From: zhou.sujing@zte.com.cn
Date: Thu, 09 Feb 2012 15:49:19 +0800
X-MIMETrack: Serialize by Router on notes_smtp/zte_ltd(Release 8.5.1FP4|July 25, 2010) at 2012-02-09 15:49:31, Serialize complete at 2012-02-09 15:49:31
Content-Type: multipart/alternative; boundary="=_alternative 002AFCAB4825799F_="
X-MAIL: mse01.zte.com.cn q197nTnJ004946
Cc: ietf-privacy@ietf.org
Subject: [ietf-privacy] 答复: RE: anonymity definition in"draft-hansen-privacy-terminology-03"
X-BeenThere: ietf-privacy@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Internet Privacy Discussion List <ietf-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf-privacy>, <mailto:ietf-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf-privacy>
List-Post: <mailto:ietf-privacy@ietf.org>
List-Help: <mailto:ietf-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf-privacy>, <mailto:ietf-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Feb 2012 07:49:45 -0000

Hi,Hannes,
I must make a clarification that the draft I took as an examle is not 
written by me :).
I just happen to read that draft and tried to find the security by 
referring  to the privacy terminology draft.

The question I have did not come only from the privacy draft by Zhang (not 
me), also from 
another definition of anonymity which is popular in cryptograhy:
 
the adversary is given two IDs, and an oracle computing an output from one 
of the IDs,
if the adversary cann't figure out the correct ID from the output with 
probability greater than 0.5, then it is called anonymous. 

But in the pivacy teminology, it is not clear if the attacker has the 
knowledge of affected IDs.

Come to Zhang's draft, it is rather easy to collect many HIP identity 
tags, and wheather or not knowledge of   identities is essential to 
evaluate the anonymity 
, at least to zhang's draft,I think.



Regards~~~

-Sujing Zhou

"Tschofenig, Hannes (NSN - FI/Espoo)" <hannes.tschofenig@nsn.com> 写于 
2012-02-09 15:17:16:

> Hi Zhou, 
> 
> Thank you for your questions. 
> 
> I guess you are looking at the terminology document from the point 
> of view of writing draft-zhang-hip-privacy-protection-04. You are 
> trying to find the right words to describe the properties of the 
> solution you have been working on. 
> 
> When you look at the privacy consideration draft (see http://tools.
> ietf.org/html/draft-iab-privacy-considerations-01) then the first 
> thing is to think about a threat model. In your communication 
> protocol you may consider the following adversaries:
> (Note that I am saying this without having followed HIP for a long 
> time and so I might be missing something here.)
> 
> * responders who get to see identity information,
> * eavesdroppers who observe the exchanges and may want to learn 
> about the communication relationships and the identities of the 
> initiator and / or the responders, and 
> * HIP-based intermediaries (e.g., these HIP-based firewalls). 
> 
> Could you explain me what the focus of your draft is with respect to
> hiding identities? 
> 
> I believe you are not trying to provide a mechanism to prevent 
> disclosing the identity of the HIP initiator to the HIP responder. I
> think you care about eavesdroppers in the middle. Is this correct?
> 
> Ciao
> Hannes
> 
> 
> From: ietf-privacy-bounces@ietf.org [mailto:ietf-privacy-
> bounces@ietf.org] On Behalf Of ext zhou.sujing@zte.com.cn
> Sent: Thursday, February 09, 2012 4:51 AM
> To: ietf-privacy@ietf.org
> Subject: [ietf-privacy] anonymity definition in"draft-hansen-
> privacy-terminology-03"
> 
> 
> Hi,all 
> 
> the definition of anonymity 
> "Definition:  Anonymity of a subject from an attacker's perspective
>      means that the attacker cannot sufficiently identify the subject
>      within a set of subjects, the anonymity set.
> " 
> 1) is not clear about the content of anonymity set, will the real 
> identities of candidate subjects be included? 
> 2) has too much variance when evaluating a scheme's anonymity. 
> 
> For example, draft-zhang-hip-privacy-protection-04 gives a privacy 
> protection scheme by  hashing the real identity: 
> B-HIT-I=SHA-1(HIT-T,N) 
> 
> and send B-HIT-I along with N (chosen for each session). 
> 
> if suppose the attacker has no knowledge of HIT-I, or  a set of HIT-
> I, the scheme has a certain anonymity; 
> if suppose the attacker has knowledge of HIT-I, or a set of HIT-
> I(which is not difficult to collect), the scheme has no anonymity 
> because he can try each HIT-I he knowes by 
> recalculating SHA-1. 
>   
> The scheme has anonymity at first and has less anonymity with time 
> went on and users have collected more HITs? 
> 
> I think as a character of system, it should be stable. 
>   
> 
> Regards~~~
> 
> -Sujing Zhou
>