Lecture

Anonymity in Communication: Tor and Cryptographic Protocols

Description

This lecture by the instructor explores the concept of anonymity in communication, focusing on the development of Tor, the limitations of Chaum's cryptographic protocols, and the challenges in achieving perfect anonymity. The presentation covers the history of Tor, the vulnerabilities in the protocol, and the implications of cryptographic breakthroughs. It questions the feasibility of achieving complete anonymity in communication systems, using examples from forensics and cryptography. The lecture delves into the technical background of entropy, impossibility results in achieving perfect anonymity, and the possibilities of partial broadcast solutions. It concludes with open problems in achieving anonymity, the impact on e-voting, and the relevance of the research in digital forensics.

About this result
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.

Graph Chatbot

Chat with Graph Search

Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.

DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.