Home Introducing VEIL: Information-Theoretic Anonymous Communication
Post
Cancel

Introducing VEIL: Information-Theoretic Anonymous Communication

The metadata problem in private communication remains unsolved. End-to-end encryption protects message content, but the communication patterns themselves—who talks to whom, when, and how often—remain visible to network observers. For journalists protecting sources, activists organizing under repressive regimes, or businesses safeguarding competitive intelligence, this metadata leakage can be as damaging as content exposure.

VEIL is a new protocol design that addresses this gap through information-theoretic guarantees rather than computational assumptions.


The Metadata Problem

Consider a typical encrypted messaging exchange. Even with perfect encryption, an observer learns:

  • Alice sent a message to Bob at 14:32:07
  • Bob replied 43 seconds later
  • They exchange messages every Tuesday afternoon
  • Message sizes suggest they’re sharing documents

This traffic analysis has proven effective in practice. Court documents, leaked surveillance programs, and academic research have repeatedly demonstrated that metadata alone suffices for identifying sources, mapping organizational structures, and inferring sensitive relationships.

Existing anonymity systems provide partial solutions. Tor protects against local observers but remains vulnerable to traffic correlation by global adversaries. Mix networks add latency but typically offer only computational security. Private information retrieval schemes protect database queries but don’t address sender anonymity.


A Compositional Approach

VEIL combines three cryptographic techniques, each providing information-theoretic security for a specific property:

DC-nets for Sender Anonymity

Following Chaum’s 1988 construction, participants in a DC-net group XOR their messages with pairwise-shared keys. The resulting output reveals the message content but provides unconditional anonymity for the sender—no computational assumption can be broken to identify who sent a given message. VEIL organizes users into 64-participant cohorts with hierarchical aggregation to scale beyond the O(n²) communication complexity of naive DC-nets.

Verifiable Mix Cascades for Unlinkability

Messages pass through a cascade of mix servers that shuffle and re-encrypt batches. Unlike traditional mixes, VEIL requires each server to produce a STARK proof demonstrating correct shuffle execution. This provides public verifiability without trusted parties while maintaining 128-bit computational security for the shuffle itself.

Threshold PIR for Receiver Privacy

Recipients retrieve messages through private information retrieval queries distributed across 7 servers in independent jurisdictions. Using Shamir secret sharing with a 5-of-7 threshold, no coalition smaller than 5 servers learns which messages a user retrieves. This provides information-theoretic receiver privacy against realistic adversaries who might compromise or coerce some but not all PIR servers.


Threat Model

VEIL targets a global passive adversary with active capabilities bounded by threshold assumptions. Specifically:

  • The adversary observes all network traffic
  • The adversary may control up to 31 of 64 participants in any DC-net group
  • The adversary may control up to 2 of 5 mix servers in any cascade
  • The adversary may control up to 4 of 7 PIR servers

Under these assumptions, VEIL provides:

Property Security Level
Sender anonymity (within DC-net groups) Information-theoretic
Receiver privacy (message retrieval) Information-theoretic
Message flow unlinkability 128-bit computational
Undetectability (Tier 3 mode) Information-theoretic (rejection-sampled steganography)

We explicitly do not defend against endpoint compromise. A malware-infected device defeats any network-layer anonymity system. Similarly, application-layer traffic analysis (timing patterns in interactive chat, document fingerprinting) falls outside our threat model.


Why Now?

Three developments make this design timely:

Post-Quantum Readiness

VEIL uses ML-KEM-1024 in a hybrid construction with X25519. The information-theoretic components require no changes for quantum adversaries; the computational components have straightforward post-quantum replacements already standardized by NIST.

Efficient Zero-Knowledge Proofs

STARK proofs have matured substantially since their introduction in 2018. Modern implementations achieve verification in milliseconds with proof sizes under 100KB, making verifiable shuffles practical for real-time communication.

Jurisdictional Diversification

The PIR threshold design explicitly distributes trust across legal jurisdictions. No single government can compel all 5-of-7 servers to collude, providing meaningful protection against lawful-intercept demands that have undermined centralized systems.


Current Status

The V17 specification is complete, comprising:

  • Protocol specification with message formats, state machines, and parameter choices
  • Security proofs with formal reductions to underlying assumptions
  • Adversarial analysis covering 50+ attack vectors across 13 threat actor profiles
  • Performance analysis demonstrating 200ms latency at 10^8 user scale

Implementation has not begun. The specification is available for review, and we welcome contributions from cryptographers, security researchers, and systems engineers.


Open Questions

Several areas warrant further investigation:

Formal Verification

The current proofs are paper proofs with reduction sketches. Machine-checked verification in Coq or Lean would strengthen confidence, particularly for the composition arguments.

Side-Channel Resistance

The specification mandates constant-time implementations but doesn’t provide detailed guidance for cache-timing, power analysis, or electromagnetic emanation resistance.

Economic Sustainability

The design includes bonded stake requirements for infrastructure operators, but the economic model needs refinement and real-world validation.

Usability

Information-theoretic security means nothing if users can’t or won’t use the system. Key management, group coordination, and failure recovery all require careful UX design.


Getting Involved

The protocol specification and whitepapers are available at github.com/veil-protocol.

We’re particularly interested in:

  • Cryptographic review of the security proofs
  • Protocol analysis and attack finding
  • Formal verification efforts
  • Implementation collaborators with experience in constant-time cryptographic code

VEIL represents an attempt to push anonymous communication from computational to information-theoretic security. Whether this proves practical remains to be seen, but we believe the attempt is worth making.


The VEIL protocol specification is released under the MIT license.

This post is licensed under CC BY 4.0 by the author.