cations anonymous so that given a message it would
not be possible for a profiler to trace the origin of the
message. In this paper we ask the following question:
What would be the exact security requirements for an
encryption scheme which can protect the communica-
tion from profilers? Intuitively a cipher obtained from
a secure encryption algorithm should not reveal any
information regarding the plaintext which was used to
produce the cipher. Hence, a secure encryption algo-
rithm should surely resist attacks by profilers. But, as
the goal of a profiler is only to classify the messages,
it is possible that an encryption algorithm which pro-
vides security in a weaker sense would be enough to
resist profilers. We explore in this direction and try to
fix the appropriate security definition of an encryption
scheme which would provide security against profil-
ers.
Using any encryption scheme involves the com-
plicated machinery of key exchange (for symmetric
encryption) or a public key infrastructure (for asym-
metric encryption). When the goal is just to protect
information against profilers the heavy machinery of
key exchange or public key infrastructure may be un-
necessary. Keeping in mind security against profil-
ers we propose a new protocol which does not require
explicit key exchange. To do this we use the notion
of CAPTCHAs, which are programs that can distin-
guish between humans and machines by automated
Turing tests which are easy for humans to pass but
difficult for any machine. The use of CAPTCHAs
makes our protocol secure from non-human profilers,
but the protocol is still vulnerable to human adver-
saries. In the context that we see the activity of pro-
filing, it would be only profitable if a large number of
users can be profiled and this goal seems to be infea-
sible if human profilers are employed for the task.
To our knowledge the only prior work on the is-
sue of securing email communication from profilers
have been reported in (Golle and Farahat, 2004). In
(Golle and Farahat, 2004) it was pointed out that
an encryption scheme secure against profilers can be
much weaker than normal encryption algorithms, and
thus using a normal encryption algorithm can be an
overkill. The solution in (Golle and Farahat, 2004)
hides the semantic of the plaintext by converting an
English text into another English text with the help
of a key. In their protocol also they do not need ex-
plicit key exchange or a public key infrastructure. The
key is derived from the email header by using a hash
function with a specific property. The hash function
they use is a “slow one-way hash function”, which
was first proposed in (Dwork and Naor, 1992). Such
hash functions are difficult to compute, i.e., may take
a few seconds to get computed and are hard to in-
vert. This high computational cost for the hash func-
tion prevents a profiler to derive the key for a large
number of messages. Our method is fundamentally
different from (Golle and Farahat, 2004) in its use of
CAPTCHAs. Slow hash functions which were pro-
posed long ago have not seen much use, and its suit-
ability is not well tested. But CAPTCHAs are ubiqui-
tous in today’s world and had been used successfully
in diverse applications. Also, our work presents a the-
oretical analysis of the problem, and provides the se-
curity definitions which to our knowledge is new to
the literature.
The rest of the paper is organized as follows. In
Section 2 we describe basic concepts related to in-
distinguishability, CAPTCHA and secret sharing. In
Section 3 we present a formal definition of a profil-
ing adversary and security against such adversaries.
In Sections 4 and 5 we describe our protocols and ar-
gue regarding their security in terms of the security
notion given in Section 3. We conclude the paper in
Section 6 where we discuss about the limitations of
our approach and some future directions.
2 PRELIMINARIES
2.1 Notations
The set of all n bit strings would be denoted by
{0,1}
n
. For a string x, |x| will denote the length of
x and for a finite set A, |A| would denote the cardi-
nality of A. For a finite set S , x
$
← S will denote x
to be an element selected uniformly at random from
S. In what follows, by an adversary we shall mean a
probabilistic algorithm which outputs an integer or a
bit. A(x,y) ⇒ b, will denote the fact that an adver-
sary A given inputs x,y outputs b. In general an ad-
versary would have other sorts of interactions, maybe
with other adversaries and/or algorithms before it out-
puts, these would be clear from the context. In what
follows by E : K × M → C would denote an encryp-
tion scheme with K , M , C as the key space, mes-
sage space and cipher space respectively. For m ∈ M
and k ∈ K we shall usually write E
k
(m) instead of
E(k, m).
2.2 Indistinguishability in the Presence
of an Eavesdropper
Security of encryption schemes is best defined in
terms of indistinguishability. Here we consider in-
distinguishability in presence of an eavesdropping ad-
versary. This security notion, which we call as IND-
OnSecuringCommunicationfromProfilers
155