Summary. Compared to previous messaging sys-
tems with strong anonymity, our model shows that
Hydra is able to support significantly more users with
acceptable latency by not using asymmetric cryptog-
raphy for every message. Even more users are sup-
ported by deploying more mixes. Our findings are
supported by benchmarks and a prototype of Hydra.
6 CONCLUSION
Using padded circuits for multiple rounds allows Hy-
dra to support millions of users with strong anonymity
and relatively low latency. Further, our rendezvous
mechanism avoids shortcomings of previous circuit-
based systems with strong anonymity: A circuit may
be used to communicate with multiple contacts and
location anonymity is significantly improved.
In future, we want to combine Hydra with an
anonymity system that is able to support applications
with higher bandwidth and stricter latency require-
ments, like VoIP. For this, a similar protocol may be
used, but with tuned parameters and path selection.
Moreover, we evaluate post-quantum secure key ex-
change protocols for circuit setup. Our prototypes are
published at https://github.com/hydra-acn.
REFERENCES
Chaum, D. (1981). Untraceable electronic mail, return ad-
dresses, and digital pseudonyms. Communications of
the ACM, 24(2):84–90.
Chaum, D. (1988). The dining cryptographers prob-
lem: Unconditional sender and recipient untraceabil-
ity. Journal of Cryptology, 1(1):65–75.
Chaum, D., Das, D., Javani, F., Kate, A., Krasnova, A.,
De Ruiter, J., and Sherman, A. T. (2017). cMix: Mix-
ing with minimal real-time asymmetric cryptographic
operations. In International Conference on Applied
Cryptography and Network Security, pages 557–578.
Chen, C., Asoni, D. E., Perrig, A., Barrera, D., Danezis, G.,
and Troncoso, C. (2018). TARANET: Traffic-analysis
resistant anonymity at the network layer. In IEEE Eu-
roS&P, pages 137–152.
Corrigan-Gibbs, H., Boneh, D., and Mazi
`
eres, D. (2015).
Riposte: An anonymous messaging system handling
millions of users. In IEEE Symposium on Security and
Privacy, pages 321–338.
Dingledine, R., Mathewson, N., and Syverson, P. (2004).
Tor: The second-generation onion router. In 13th
USENIX Security.
Gelernter, N., Herzberg, A., and Leibowitz, H. (2016). Two
cents for strong anonymity: The anonymous post-
office protocol. PETS, 2016(2):1–20.
Kwon, A., Corrigan-Gibbs, H., Devadas, S., and Ford, B.
(2017). Atom: Horizontally scaling strong anonymity.
In 26th ACM SOSP, pages 406–422.
Kwon, A., Lazar, D., Devadas, S., and Ford, B. (2016). Rif-
fle: An efficient communication system with strong
anonymity. PETS, 2016(2):115–134.
Kwon, A., Lu, D., and Devadas, S. (2020). XRD: Scalable
messaging system with cryptographic privacy. In 17th
USENIX NSDI, pages 759–776.
Lazar, D., Gilad, Y., and Zeldovich, N. (2018). Karaoke:
Distributed private messaging immune to passive traf-
fic analysis. In 13th USENIX OSDI, pages 711–725.
Lazar, D., Gilad, Y., and Zeldovich, N. (2019). Yodel:
Strong metadata security for voice calls. In 27th ACM
SOSP, pages 211–224.
Lazar, D. and Zeldovich, N. (2016). Alpenhorn: Bootstrap-
ping secure communication without leaking metadata.
In 12th USENIX OSDI, pages 571–586.
Le Blond, S., Choffnes, D., Caldwell, W., Druschel, P., and
Merritt, N. (2015). Herd: A scalable, traffic analysis
resistant anonymity network for VoIP systems. ACM
SIGCOMM, 45(4):639–652.
Le Blond, S., Choffnes, D., Zhou, W., Druschel, P., Bal-
lani, H., and Francis, P. (2013). Towards efficient
traffic-analysis resistant anonymity networks. ACM
SIGCOMM, 43(4):303–314.
Mayer, J., Mutchler, P., and Mitchell, J. C. (2016). Eval-
uating the privacy properties of telephone metadata.
Proceedings of the National Academy of Sciences,
113(20):5536–5541.
Oya, S., Troncoso, C., and P
´
erez-Gonz
´
alez, F. (2014). Do
dummies pay off? Limits of dummy traffic protection
in anonymous communications. In International Sym-
posium on Privacy Enhancing Technologies, pages
204–223. Springer.
Patarin, J., Gittins, B., and Treger, J. (2012). Increasing
block sizes using feistel networks: The example of the
aes. In Cryptography and Security: From Theory to
Applications, pages 67–82. Springer.
Pham, D. V., Wright, J., and Kesdogan, D. (2011). A prac-
tical complexity-theoretic analysis of mix systems. In
European Symposium on Research in Computer Secu-
rity, pages 508–527. Springer.
Piotrowska, A. M., Hayes, J., Elahi, T., Meiser, S., and
Danezis, G. (2017). The loopix anonymity system.
In 26th USENIX Security, pages 1199–1216.
Tyagi, N., Gilad, Y., Leung, D., Zaharia, M., and Zeldovich,
N. (2017). Stadium: A distributed metadata-private
messaging system. In 26th ACM SOSP, pages 423–
440.
Van Den Hooff, J., Lazar, D., Zaharia, M., and Zeldovich,
N. (2015). Vuvuzela: Scalable private messaging re-
sistant to traffic analysis. In 25th ACM SOSP, pages
137–152.
Wang, X., Chen, S., and Jajodia, S. (2007). Network flow
watermarking attack on low-latency anonymous com-
munication systems. In IEEE Symposium on Security
and Privacy, pages 116–130.
Hydra: Practical Metadata Security for Contact Discovery, Messaging, and Dialing
203