at their destinations, they are wrapped in layers of encryption (hence they are called"
onions"). The goal is to make it hard to establish who sent the message. It is a practical and
widespread tool for creating anonymous channels. For the standard adversary models--
network, passive, and active--we present practical and provably secure onion routing
protocols. Akin to Tor, in our protocols each party independently chooses the routing paths …