Simon Langowski (Massachusetts Institute of Technology), Sacha Servan-Schreiber (Massachusetts Institute of Technology), Srinivas Devadas (Massachusetts Institute of Technology)

Trellis is a mix-net based anonymous broadcast
system with cryptographic security guarantees. Trellis can be used
to anonymously publish documents or communicate with other
users, all while assuming full network surveillance. In Trellis,
users send messages through a set of servers in successive rounds.
The servers mix and post the messages to a public bulletin board,
hiding which users sent which messages.

Trellis hides all network-level metadata, remains robust to
changing network conditions, guarantees availability to honest
users, and scales with the number of mix servers. Trellis provides three to five orders of magnitude faster performance and
better network robustness compared to Atom, the state-of-the-art
anonymous broadcast system with a similar threat model.
In achieving these guarantees, Trellis contributes: (1) a
simpler theoretical mixing analysis for a routing mix network
constructed with a fraction of malicious servers, (2) anonymous
routing tokens for verifiable random paths, and (3) lightweight
blame protocols built on top of onion routing to identify and
eliminate malicious parties.

We implement and evaluate Trellis in a networked deployment. With 64 servers located across four geographic regions,
Trellis achieves a throughput of 220 bits per second with 100,000
users. With 128 servers, Trellis achieves a throughput of 320
bits per second. Trellis’s throughput is only 100 to 1000× slower
compared to Tor (which has 6,000 servers and 2M daily users)
and is therefore potentially deployable at a smaller “enterprise”
scale. Our implementation is open-source.

View More Papers

CableAuth: A Biometric Second Factor Authentication Scheme for Electric...

Jack Sturgess, Sebastian Köhler, Simon Birnbach, Ivan Martinovic (University of Oxford)

Read More

RCABench: Open Benchmarking Platform for Root Cause Analysis

Keisuke Nishimura, Yuichi Sugiyama, Yuki Koike, Masaya Motoda, Tomoya Kitagawa, Toshiki Takatera, Yuma Kurogome (Ricerca Security, Inc.)

Read More

Your Router is My Prober: Measuring IPv6 Networks via...

Long Pan (Tsinghua University), Jiahai Yang (Tsinghua University), Lin He (Tsinghua University), Zhiliang Wang (Tsinghua University), Leyao Nie (Tsinghua University), Guanglei Song (Tsinghua University), Yaozhong Liu (Tsinghua University)

Read More

Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks...

Hadi Abdullah (Visa Research), Aditya Karlekar (University of Florida), Saurabh Prasad (University of Florida), Muhammad Sajidur Rahman (University of Florida), Logan Blue (University of Florida), Luke A. Bauer (University of Florida), Vincent Bindschaedler (University of Florida), Patrick Traynor (University of Florida)

Read More