Performance and security improvements for tor: A survey

M AlSabah, I Goldberg - ACM Computing Surveys (CSUR), 2016 - dl.acm.org
Tor [Dingledine et al. 2004] is the most widely used anonymity network today, serving
millions of users on a daily basis using a growing number of volunteer-run routers. Since its …

[图书][B] Protocols for authentication and key establishment

C Boyd, A Mathuria, D Stebila - 2003 - Springer
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …

cMix: Mixing with minimal real-time asymmetric cryptographic operations

D Chaum, D Das, F Javani, A Kate, A Krasnova… - … and Network Security …, 2017 - Springer
We introduce cMix, a new approach to anonymous communications. Through a
precomputation, the core cMix protocol eliminates all expensive real-time public-key …

cMix: Anonymization by high-performance scalable mixing

D Chaum, F Javani, A Kate, A Krasnova, J Ruiter… - 2016 - mdsoar.org
Abstract cMix is a cryptographic protocol for mix networks that uses precomputations of a
group-homomorphic encryption function to avoid all real-time public-key operations by the …

Post-quantum anonymous one-sided authenticated key exchange without random oracles

R Ishibashi, K Yoneyama - IACR International Conference on Public-Key …, 2022 - Springer
Abstract Authenticated Key Exchange (AKE) is a cryptographic protocol to share a common
session key among multiple parties. Usually, PKI-based AKE schemes are designed to …

TUC: time-sensitive and modular analysis of anonymous communication

M Backes, P Manoharan… - 2014 IEEE 27th …, 2014 - ieeexplore.ieee.org
The anonymous communication protocol Tor constitutes the most widely deployed
technology for providing anonymity for user communication over the Internet. Several …

Post-Quantum Forward-Secure Onion Routing: (Future Anonymity in Today's Budget)

S Ghosh, A Kate - International Conference on Applied Cryptography and …, 2015 - Springer
The onion routing (OR) network Tor provides anonymity to its users by routing their
encrypted traffic through three proxies (or nodes). The key cryptographic challenge, here, is …

MediSim: A prototype VR system for training medical first responders

S Stansfield, D Shawver, A Sobel - Proceedings. IEEE 1998 …, 1998 - ieeexplore.ieee.org
This paper presents a prototype virtual reality (VR) system for training medical first
responders. The initial application is to battlefield medicine and focuses on the training of …

A survey on measuring anonymity in anonymous communication systems

T Lu, Z Du, ZJ Wang - IEEE Access, 2019 - ieeexplore.ieee.org
The popularity of Internet applications has made communication privacy an increasingly
important security requirement. As an important aspect of privacy, anonymity ensures that a …

BackRef: Accountability in anonymous communication networks

M Backes, J Clark, A Kate, M Simeonovski… - … and Network Security …, 2014 - Springer
Many anonymous communication networks (ACNs) rely on routing traffic through a
sequence of proxy nodes to obfuscate the originator of the traffic. Without an accountability …