Practical and provably secure onion routing

M Ando, A Lysyanskaya, E Upfal - arXiv preprint arXiv:1706.05367, 2017 - arxiv.org
arXiv preprint arXiv:1706.05367, 2017arxiv.org
In an onion routing protocol, messages travel through several intermediaries before arriving
at their destinations, they are wrapped in layers of encryption (hence they are called"
onions"). The goal is to make it hard to establish who sent the message. It is a practical and
widespread tool for creating anonymous channels. For the standard adversary models--
network, passive, and active--we present practical and provably secure onion routing
protocols. Akin to Tor, in our protocols each party independently chooses the routing paths …
In an onion routing protocol, messages travel through several intermediaries before arriving at their destinations, they are wrapped in layers of encryption (hence they are called "onions"). The goal is to make it hard to establish who sent the message. It is a practical and widespread tool for creating anonymous channels. For the standard adversary models -- network, passive, and active -- we present practical and provably secure onion routing protocols. Akin to Tor, in our protocols each party independently chooses the routing paths for his onions. For security parameter , our differentially private solution for the active adversary takes rounds and requires every participant to transmit onions in every round.
arxiv.org
以上显示的是最相近的搜索结果。 查看全部搜索结果