This paper describes security protocols that use anonymous channels as primitive, much in the way that key distribution protocols ryption as primitive. This abstraction allows us to focus on high onymity goals of these protocols much as abstracting away from encryption clari es and emphasizes high level security goals of key distribution protocols. The contributions of this paper are 1 a notation for describing such protocols, and 2 two protocols for location protected communication over a public infrastructure.
Michael G. Reed, Paul F. Syverson, David M. Goldsc