🤖 AI Summary
Anonymous communication networks face core challenges including AI-driven metadata tracking, difficulties in decentralized implementation, and the absence of provably secure designs. This paper introduces the first decentralized anonymous routing protocol with a rigorous formal proof of user identity indistinguishability under an extreme adversarial model—eliminating reliance on threshold assumptions or trusted third parties. The protocol integrates cryptographic privacy primitives (e.g., cover traffic routing and differential-privacy-based traffic shaping), distributed topology control, and a formal security verification framework, achieving robust resistance against both passive traffic analysis and active tracing attacks. We formally prove that it satisfies strong anonymity guarantees—namely, k-anonymity and unlinkability. Simulation results demonstrate high throughput and low bandwidth overhead while maintaining sub-millisecond end-to-end latency. Our work establishes a new paradigm for practical, strongly private communication that simultaneously ensures theoretical soundness and deployment feasibility.
📝 Abstract
Anonymous communication networks have emerged as crucial tools for obfuscating communication pathways and concealing user identities. However, their practical deployments face significant challenges, including susceptibility to artificial intelligence (AI)-powered metadata analysis, difficulties in decentralized architectures, and the absence of provable security guarantees. To address these issues, this paper proposes a novel decentralized anonymous routing protocol with resistance to tracing and traffic analysis. The protocol eliminates dependencies on the threshold model and trusted third-party setups, ensuring indistinguishable identity privacy even in highly adversarial environments. Different from traditional empirical security analysis of anonymous networks, this paper rigorously proves indistinguishable identity privacy for users even in extremely adversarial environments. Furthermore, simulations confirm its practical feasibility, demonstrating both security and efficiency. By achieving information sharing with privacy preservation, the proposed protocol offers a provably secure solution for privacy-preserving communication in digital environments.