Fundamental Constraints And Provably Secure Constructions Of Anonymous Communication Protocols