Duo-Onions and Hydra-Onions — Failure and Adversary Resistant Onion Protocols

作者: Jan Iwanik , Marek Klonowski , Miroslaw Kutyłowski

DOI: 10.1007/0-387-24486-7_1

关键词:

摘要: A serious weakness of the onion protocol, one major tools for anonymous communication, is its vulnerability to network failures and/or an adversary trying break communication. This facilitated by fact that each message sent through a path certain length and failure in single point this prohibits delivery. Since cannot be too short order offer anonymity protection (at least logarithmic number nodes), probability might quite substantial.

参考文章(16)
David L. Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms Communications of The ACM. ,vol. 24, pp. 84- 90 ,(1981) , 10.1145/358549.358563
Dogan Kesdogan, Jan Egner, Roland Büschkes, Stop-and-Go-MIXes Providing Probabilistic Anonymity in an Open System information hiding. pp. 83- 98 ,(1998) , 10.1007/3-540-49380-8_7
Paul Syverson, Gene Tsudik, Michael Reed, Carl Landwehr, Towards an analysis of onion routing security privacy enhancing technologies. pp. 96- 114 ,(2001) , 10.1007/3-540-44702-4_6
Noga Alon, Testing subgraphs in large graphs Random Structures and Algorithms. ,vol. 21, pp. 359- 370 ,(2002) , 10.1002/RSA.10056
M. Wright, M. Adler, B.N. Levine, C. Shields, Defending anonymous communications against passive logging attacks ieee symposium on security and privacy. pp. 28- 41 ,(2003) , 10.1109/SECPRI.2003.1199325
Ron Berman, Amos Fiat, Amnon Ta-Shma, Provable unlinkability against traffic analysis financial cryptography. pp. 266- 280 ,(2004) , 10.1007/978-3-540-27809-2_26
Marcin Gomułkiewicz, Marek Klonowski, Mirosław Kutyłowski, Provable Unlinkability Against Traffic Analysis Already After O(log(n)) Steps international conference on information security. pp. 354- 366 ,(2004) , 10.1007/978-3-540-30144-8_30
Michael J. Freedman, Emil Sit, Josh Cates, Robert Morris, Introducing Tarzan, a Peer-to-Peer Anonymizing Network Layer international workshop on peer to peer systems. pp. 121- 129 ,(2002) , 10.1007/3-540-45748-8_12
Paul F. Syverson, Michael G. Reed, David M. Goldschlag, Private Web browsing Journal of Computer Security. ,vol. 5, pp. 237- 248 ,(1997) , 10.3233/JCS-1997-5305