Secure and anonymous communication technique: Formal model and its prototype implementation

K Emura, A Kanaoka, S Ohta, K Omote… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Both anonymity and end-to-end encryption are recognized as important properties in privacy-
preserving communication. However, secure and anonymous communication protocol that …

Building secure and anonymous communication channel: Formal model and its prototype implementation

K Emura, A Kanaoka, S Ohta, T Takahashi - Proceedings of the 29th …, 2014 - dl.acm.org
Various techniques need to be combined to realize anonymously authenticated
communication. Cryptographic tools enable anonymous user authentication while …

Establishing secure and anonymous communication channel: KEM/DEM-based construction and its implementation

K Emura, A Kanaoka, S Ohta, T Takahashi - Journal of Information Security …, 2017 - Elsevier
Several cryptographic tools provide anonymity in a cryptographic sense, but solely using
such a tool does not guarantee anonymity; for example, even if the underlying cryptographic …

A controllable and trusted anonymous communication scheme

ZQ Wu, YW Zhou, ZR Qiao - Jisuanji Xuebao(Chinese Journal of …, 2010 - cjc.ict.ac.cn
Encryption technology can only carry on the protection to the correspondence data content,
but in some special application fields, such as e-voting, e-health, e-commerce and e-cash …

Anonymous Communication via Anonymous Identity‐Based Encryption and Its Application in IoT

L Jiang, T Li, X Li, M Atiquzzaman… - Wireless …, 2018 - Wiley Online Library
Under the environment of the big data, the correlation between the data makes people have
a greater demand for privacy. Moreover, the world has become more diversified and …

[图书][B] Design and analysis of efficient anonymous-communication protocols

A Johnson - 2009 - search.proquest.com
Research into protocols for anonymous communication in networks has yielded many
designs and a wide range of functionality and performance options. Of these, only a few …

Anonymous communication and its importance in social networking

NP Hoang, D Pishva - 16th international conference on …, 2014 - ieeexplore.ieee.org
Digital information has become a social infrastructure and with the expansion of the Internet,
network infrastructure has become an indispensable part of social life and industrial activity …

Another look at anonymous communication

RWF Lai, KF Cheung, SSM Chow… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Anonymous communication is desirable for personal, financial, and political reasons.
Despite the abundance of frameworks and constructions, anonymity definitions are usually …

Comparison of low-latency anonymous communication systems-practical usage and performance

T Ries, A Panchenko, T Engel - Ninth Australasian Information …, 2011 - orbilu.uni.lu
The most popular system for providing practical low-latency anonymity on the Internet is Tor.
However, many other tools besides Tor exist as both free and commercial solutions. In this …

Protocols for purpose-restricted anonymous communications in IP-based wireless networks

H Fathi, SH Shin, K Kobara, H Imai - Computer communications, 2008 - Elsevier
Anonymity and specifically sender anonymity have become essential requirements for many
privacy-related applications (eg net counselling and whistle blowing). On the other hand …