论文标题
BCMIX:一个动态的自组织基于区块链的混合匿名系统
BCMIX: A Dynamic Self-organizing Blockchain-based Mix Anonymous System
论文作者
论文摘要
对保护隐私的认识的提高导致人们对保护匿名性的匿名系统非常重视。通过研究早期方案,我们总结了一些匿名系统的棘手问题。集中式设置是一个通用的问题,因为大多数匿名系统都依靠中心代理或预设节点来转发和混合消息,这会损害用户的隐私。此外,由于额外的额外资源(即带宽和存储)和较高的延迟,可用性成为限制匿名系统开发的另一个重要因素。此外,现有的匿名系统可能会遭受不同的攻击,包括可恶的中间人(MITM)攻击,分布式拒绝服务(DDOS)攻击等。在这种情况下,我们首先提出了基于区块链的混合网(BCMN)协议,并理论上证明了其安全性和匿名性。然后,我们构建一个基于具体的动态自组织区块链匿名系统(BCMIX)。在系统中,用户和混合节点利用区块链交易及其地址相互协商密钥,可以抵抗MITM攻击。此外,我们设计了一种IP碎片算法来减轻Sybil攻击。为了评估BCMIX系统,我们利用现实世界中采矿池的分布来测试系统的性能和抵抗攻击的能力。与其他系统相比,BCMIX为已知攻击提供了更好的弹性,同时实现了低潜伏期的匿名通信,而没有大量的带宽或存储资源。
Increasing awareness of privacy-preserving has led to a strong focus on anonymous systems protecting anonymity. By studying early schemes, we summarize some intractable problems of anonymous systems. Centralization setting is a universal problem since most anonymous system rely on central proxies or presetting nodes to forward and mix messages, which compromises users' privacy in some way. Besides, availability becomes another important factor limiting the development of anonymous system due to the large requirement of additional additional resources (i.e. bandwidth and storage) and high latency. Moreover, existing anonymous systems may suffer from different attacks including abominable Man-in-the-Middle (MitM) attacks, Distributed Denial-of-service (DDoS) attacks and so on. In this context, we first come up with a BlockChain-based Mix-Net (BCMN) protocol and theoretically demonstrate its security and anonymity. Then we construct a concrete dynamic self-organizing BlockChain-based MIX anonymous system (BCMIX). In the system, users and mix nodes utilize the blockchain transactions and their addresses to negotiate keys with each other, which can resist the MitM attacks. In addition, we design an IP sharding algorithm to mitigate Sybil attacks. To evaluate the BCMIX system, we leverage the distribution of mining pools in the real world to test the system's performance and ability to resistant attacks. Compared with other systems, BCMIX provides better resilience to known attacks, while achieving low latency anonymous communication without significant bandwidth or storage resources.