California Institute of Technology
In this paper, the authors consider design and analysis of coding-based anonymous routing systems in Peer-To-Peer (P2P) overlay networks. An unknown subset of participating nodes is adversarial, and can collude to try to identify the communicating nodes through passive observations. The paper considers sub-graph setup in the absence of a reliable Public Key Infrastructure (PKI). As in the "Slicing the onion" scheme proposed by Katti et al., a sender constructs a layered sub-graph over which coding is performed, but they propose a new coding scheme with a formal information theoretic security characterization.