Anonymity scheme for interactive P2P services

Sharon Shitrit, Eyal Felstaine, Niv Gilboa, Ofer Hermoni

Research output: Contribution to journalArticlepeer-review

3 Scopus citations


The flourishing of Peer-to-Peer (P2P) applications has encouraged extensive research on end-to-end anonymity. In particular, interactive services such as Voice over IP (VoIP) are becoming extremely popular and require low latency. Preserving the anonymity of users in such services is becoming a major challenge. While existing schemes provide anonymity for the communicating parties; they incur high latency and are not suitable for interactive services. Even designs that attempt to reduce the latency employ an encryption scheme that involves a comparatively high computation overhead and delay. In this paper, we describe a novel low-latency P2P scheme that provides anonymity for both sender and receiver while adhering to strict and low bounds of delay, communication and bandwidth overheads. The design offers resistance against various attacks including a coalition of malicious peers. It has inherited scalability and fault tolerance and is applicable for various interactive P2P services, such as instant messaging, VoIP and video conference.

Original languageEnglish
Pages (from-to)299-312
Number of pages14
JournalJournal of Internet Technology
Issue number3
StatePublished - 1 Dec 2009


  • Anonymity
  • Distributed Hash Table (DHT)
  • File-Sharing
  • Interactive Services
  • Low-Latency
  • Peer-to-Peer (P2P)

ASJC Scopus subject areas

  • Software
  • Computer Networks and Communications


Dive into the research topics of 'Anonymity scheme for interactive P2P services'. Together they form a unique fingerprint.

Cite this