Ania M. Piotrowska's research while affiliated with WWF United Kingdom and other places
What is this page?
This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
Publications (12)
Mix networks were developed to hide the correspondence between senders and recipients of the communication. In order to be usable and defend user privacy, anonymous communication networks like mixnets need to be parameterized in an optimal manner. This work uses a mixnet simulator to determine reasonable packet size and parameters for the real-worl...
In this work, we present a discrete event mix network simulator, which allows analysing how anonymity, latency, and bandwidth overhead are affected by various scenarios of deployment and design choices. These design choices include network topology, mixing technique, volume of traffic, latency requirements, packet size or use of cover traffic. To t...
Every modern online application relies on the network layer to transfer information, which exposes the metadata associated with digital communication. These distinctive characteristics encapsulate equally meaningful information as the content of the communication itself and allow eavesdroppers to uniquely identify users and their activities. Hence,...
Mix networks are a key technology to achieve network anonymity and private messaging, voting and database lookups. However, simple mix network designs are vulnerable to malicious mixes, which may drop or delay packets to facilitate traffic analysis attacks. Mix networks with prov-able robustness address this drawback through complex and expensive p...
Mix networks are a key technology to achieve network anonymity, private messaging, voting and database lookups. However, simple mix networks are vulnerable to malicious mixes, which may drop or delay packets to facilitate traffic analysis attacks. Mix networks with provable robustness address this drawback through complex and expensive proofs of co...
AnNotify is a scalable service for private, timely and low-cost on-line notifications, based on anonymous communication, sharding, dummy queries, and Bloom filters. We present the design and analysis of AnNotify, as well as an evaluation of its costs. We outline the design of AnNotify and calculate the concrete advantage of an adversary observing m...
In this paper we present a light-weight data aggregation protocol based on probabilistic data structure used for representing a subset of elements called Bloom filter. Our construction is optimal (up to a small multiplicative constant) in terms of the size of the aggregated data representation. Moreover, all necessary operations have minimal comput...
We present Loopix, a low-latency anonymous communication system that provides bi-directional 'third-party' sender and receiver anonymity and unobservability. Loopix leverages cover traffic and brief message delays to provide anonymity and achieve traffic analysis resistance, including against a global network adversary. Mixes and clients self-monit...
We present Loopix, a low-latency anonymous communication system that provides bi-directional 'third-party' sender and receiver anonymity and unobservability. Loopix leverages cover traffic and brief message delays to provide anonymity and achieve traffic analysis resistance, including against a global network adversary. Mixes and clients self-monit...
AnoNotify is a service for private, timely and low-cost on-line notifications. We present the design and security arguments behind AnoNotify, as well as an evaluation of its cost. AnoNotify is based on mix-networks, Bloom filters and shards. We present a security definition and security proofs for AnoNotify. We then discuss a number of applications...
One of the emerging problems on the border of privacy protection research and e-commerce is the monetization of sensitive data. More precisely, a client would like to obtain some statistical data about users’ personal information in exchange for a reward. To satisfy both parties, a monetization protocol should ensure that users’ privacy is not viol...
Citations
... Cover Traffic and Delay. To study the implications of using cover traffic on the effectiveness of the intersection attacks, each user generates a fixed number of dummy messages to hide every single real message (this is the same cover traffic generation approach used in [22]). The generated dummy messages are sent in random rounds to create noise in the user's sending rate. ...
... (e.g., only recipient anonymity [6]). We refer the reader to the excellent survey of systems in Piotrowska's PhD thesis [85]. ...
... In MixNN, the designer cannot distinguish between the two scenarios, and the simplest way is to replace both the servers. MixNN can use the same approach proposed by Hemi et al. [31] to isolate malicious servers before a cascade transfers the real message. ...
... The more recent Nym system [19] is based on Loopix [24], which uses a stratified topology [9]. This topology requires communication be sent through nodes arranged in fixed layers (positions) where layer order is fixed for all communicants, but originators can choose any node within each layer. ...
... This work was published in Proceedings of the 2017 on Workshop on Privacy in the Electronic Society (WPES) [53] and it is a joined work with George Danezis, Nethanel Gelernter, Jamie Hayes and Amir Herzberg. I have provided most of the key design ideas and security analysis. ...
... existing contributions. [12], [13], [16] ∈ B1; [17] ∈ B2; [15], [18] ∈ B3; [14] ∈ B4; [19] ∈ A1; [20], [21] ∈ A2; [22] ∈ A3; [23] ∈ A4; [24], [25] ∈ A5; [10], [6], [7], [26] ∈ A7. ...
... We explain how to do so in Appendix A.2. We also assume that users can use an anonymous communication channel [35,66] to communicate with the TS and SPs to protect their privacy at the network layer. Suppose that Alice uses Schnorr's identification protocol to authenticate herself to her bank. ...
... According to Piotrowska and Klonowski (2015), the privacy of individuals and data sensitivity should be considered in processing and collecting data. In general, one of the major challenges in data monetization is related to organizations, especially with respect to their credibility and public trust, concerning the issue of privacy (Thomas and Leiponen 2016). ...