메뉴 건너뛰기




Volumn 4776 LNCS, Issue , 2007, Pages 95-112

Pairing-based onion routing

Author keywords

[No Author keywords available]

Indexed keywords

DATA PRIVACY; ITERATIVE METHODS; PUBLIC KEY CRYPTOGRAPHY;

EID: 38149092452     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-75551-7_7     Document Type: Conference Paper
Times cited : (64)

References (34)
  • 1
    • 84874324906 scopus 로고    scopus 로고
    • Identity-Based Encryption from the Weil Pairing
    • Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
    • Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 2
    • 33745174191 scopus 로고    scopus 로고
    • A Formal Treatment of Onion Routing
    • Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
    • Camenisch, J., Lysyanskaya, A.: A Formal Treatment of Onion Routing. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 169-187. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 169-187
    • Camenisch, J.1    Lysyanskaya, A.2
  • 3
    • 0019532104 scopus 로고
    • Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms
    • Chaum, D.: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM 4(2), 84-88 (1981)
    • (1981) Communications of the ACM , vol.4 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 5
    • 38149017551 scopus 로고    scopus 로고
    • Dai, W.: PipeNet 1.1. Post to Cypherpunks mailing list (November 1998)
    • Dai, W.: PipeNet 1.1. Post to Cypherpunks mailing list (November 1998)
  • 6
    • 38149102159 scopus 로고    scopus 로고
    • Dingledine, R., Mathewson, N.: The Tor Protocol Specification (accessed February 2007), http://tor.eff.org/svn/trunk/doc/spec/tor-spec.txt
    • Dingledine, R., Mathewson, N.: The Tor Protocol Specification (accessed February 2007), http://tor.eff.org/svn/trunk/doc/spec/tor-spec.txt
  • 8
    • 29244438183 scopus 로고    scopus 로고
    • Provably secure non-interactive key distribution based on pairings
    • Dupont, R., Enge, A.: Provably secure non-interactive key distribution based on pairings. Discrete Applied Mathematics 154(2), 270-276 (2006)
    • (2006) Discrete Applied Mathematics , vol.154 , Issue.2 , pp. 270-276
    • Dupont, R.1    Enge, A.2
  • 9
    • 34547358080 scopus 로고    scopus 로고
    • Advances in Elliptic Curve Cryptography
    • Blake, I, ed, Cambridge University Press, Cambridge
    • Blake, I. (ed.): Advances in Elliptic Curve Cryptography. London Mathematical Society Lecture Note Series, vol. 317. Cambridge University Press, Cambridge (2005)
    • (2005) London Mathematical Society Lecture Note Series , vol.317
  • 10
    • 0038349207 scopus 로고    scopus 로고
    • Frcedman, M.J., Morris, R.: Tarzan: A Peer-to-Peer Anonymizing Network Layer. In: CCS 2002. Proceedings of the 9th ACM Conference on Computer and Communications Security, ACM Press, Washington, DC (2002)
    • Frcedman, M.J., Morris, R.: Tarzan: A Peer-to-Peer Anonymizing Network Layer. In: CCS 2002. Proceedings of the 9th ACM Conference on Computer and Communications Security, ACM Press, Washington, DC (2002)
  • 11
    • 84955339164 scopus 로고    scopus 로고
    • Secure integration of asymmetric and symmetric encryption schemes
    • Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
    • Fujisaki, E., Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 537-554. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 537-554
    • Fujisaki, E.1    Okamoto, T.2
  • 12
    • 33846862213 scopus 로고    scopus 로고
    • Secure Distributed Key Generation for Discrete-Log Based Cryptosystems
    • Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. Journal of Cryptology 20(1), 51-83 (2007)
    • (2007) Journal of Cryptology , vol.20 , Issue.1 , pp. 51-83
    • Gennaro, R.1    Jarecki, S.2    Krawczyk, H.3    Rabin, T.4
  • 13
    • 72849147698 scopus 로고    scopus 로고
    • Goldberg, I.: On the Security of the Tor Authentication Protocol. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, 4258, pp. 316-331. Springer, Heidelberg (2006)
    • Goldberg, I.: On the Security of the Tor Authentication Protocol. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 316-331. Springer, Heidelberg (2006)
  • 14
    • 84955557456 scopus 로고    scopus 로고
    • Hiding Routing Information
    • Anderson, R, ed, Information Hiding, Springer, Heidelberg
    • Goldschlag, D., Reed, M., Syverson, P.: Hiding Routing Information. In: Anderson, R. (ed.) Information Hiding. LNCS, vol. 1174, pp. 137-150. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1174 , pp. 137-150
    • Goldschlag, D.1    Reed, M.2    Syverson, P.3
  • 15
    • 38149139908 scopus 로고    scopus 로고
    • Pairing-Based Onion Routing
    • 2007-08, Centre for Applied Cryptographic Research , Available at
    • Kate, A., Zaverucha, G.M., Goldberg, I.: Pairing-Based Onion Routing. Technical Report CACR, 2007-08, Centre for Applied Cryptographic Research (2007), Available at http://www.cacr.math.uwaterloo.ca/techreports/2007/ cacr2007-08.pdf
    • (2007) Technical Report CACR
    • Kate, A.1    Zaverucha, G.M.2    Goldberg, I.3
  • 16
    • 84943807207 scopus 로고    scopus 로고
    • Toward Secure Key Distribution in Truly Ad-Hoc Networks
    • IEEE Computer Society Press, Los Alamitos
    • Khalili, A., Katz, J., Arbaugh, W.: Toward Secure Key Distribution in Truly Ad-Hoc Networks. In: IEEE Workshop on Security and Assurance in Ad-Hoc Networks 2003, pp. 342-346. IEEE Computer Society Press, Los Alamitos (2003)
    • (2003) IEEE Workshop on Security and Assurance in Ad-Hoc Networks , pp. 342-346
    • Khalili, A.1    Katz, J.2    Arbaugh, W.3
  • 17
    • 31344437951 scopus 로고    scopus 로고
    • Pairing-Based Cryptography at High Security Levels
    • Smart, N.P, ed, Cryptography and Coding, Springer, Heidelberg
    • Koblitz, N., Menezes, A.: Pairing-Based Cryptography at High Security Levels. In: Smart, N.P. (ed.) Cryptography and Coding. LNCS, vol. 3796, pp. 13-36. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3796 , pp. 13-36
    • Koblitz, N.1    Menezes, A.2
  • 18
    • 38149126822 scopus 로고    scopus 로고
    • Lynn, B.: PBC Library - The Pairing-Based Cryptography Library (accessed February 2007), http://crypto.stanford.edu/pbc/
    • Lynn, B.: PBC Library - The Pairing-Based Cryptography Library (accessed February 2007), http://crypto.stanford.edu/pbc/
  • 19
    • 31844446595 scopus 로고    scopus 로고
    • Mauw, S., Verschuren, J., de Vink, E.: A Formalization of Anonymity and Onion Routing. In: Samarati, P., Ryan, P.Y A, Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, 3193, pp. 109-124. Springer, Heidelberg (2004)
    • Mauw, S., Verschuren, J., de Vink, E.: A Formalization of Anonymity and Onion Routing. In: Samarati, P., Ryan, P.Y A, Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol. 3193, pp. 109-124. Springer, Heidelberg (2004)
  • 22
    • 35248844472 scopus 로고    scopus 로고
    • Möller, B.: Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes. In: Joye, M. (ed.) CT-RSA 2003. LNCS, 2612, Springer, Heidelberg (2003)
    • Möller, B.: Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, Springer, Heidelberg (2003)
  • 23
    • 26944471143 scopus 로고    scopus 로고
    • Okamoto, E., Okamoto, T.: Cryptosystems Based on Elliptic Curve Pairing. In: Torra, V., Narukawa, Y., Miyamoto, S. (eds.) MDAI2005. LNCS (LNAI), 3558, pp. 13-23. Springer, Heidelberg (2005)
    • Okamoto, E., Okamoto, T.: Cryptosystems Based on Elliptic Curve Pairing. In: Torra, V., Narukawa, Y., Miyamoto, S. (eds.) MDAI2005. LNCS (LNAI), vol. 3558, pp. 13-23. Springer, Heidelberg (2005)
  • 24
    • 38349040011 scopus 로고    scopus 로고
    • Øverlier, L., Syverson, P.: Improving efficiency and simplicity of Tor circuit establishment and hidden services. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, 4776, pp. 134-152. Springer, Heidelberg (2007)
    • Øverlier, L., Syverson, P.: Improving efficiency and simplicity of Tor circuit establishment and hidden services. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, vol. 4776, pp. 134-152. Springer, Heidelberg (2007)
  • 25
    • 85030460443 scopus 로고
    • A Threshold Cryptosystem without a Trusted Party
    • Davies, D.W, ed, EUROCRYPT 1991, Springer, Heidelberg
    • Pedersen, T.: A Threshold Cryptosystem without a Trusted Party. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 522-526. Springer, Heidelberg (1991)
    • (1991) LNCS , vol.547 , pp. 522-526
    • Pedersen, T.1
  • 26
    • 38049184891 scopus 로고    scopus 로고
    • Anonymous Secure Communication in Wireless Mobile Ad-hoc Networks
    • ICUCT, Springer, Heidelberg
    • Rahman, S., Inomata, A., Okamoto, T., Mambo, M., Okamoto, E.: Anonymous Secure Communication in Wireless Mobile Ad-hoc Networks. In: ICUCT 2006. LNCS, vol. 4412, pp. 140-149. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4412 , pp. 140-149
    • Rahman, S.1    Inomata, A.2    Okamoto, T.3    Mambo, M.4    Okamoto, E.5
  • 30
    • 33749041735 scopus 로고    scopus 로고
    • Practical Security for Disconnected Nodes
    • NPSec, pp, IEEE Computer Society Press, Los Alamitos
    • Seth, A., Keshav, S.: Practical Security for Disconnected Nodes. In: IEEE ICNP Workshop on Secure Network Protocols, 2005 (NPSec), pp. 31-36. IEEE Computer Society Press, Los Alamitos (2005)
    • (2005) IEEE ICNP Workshop on Secure Network Protocols , pp. 31-36
    • Seth, A.1    Keshav, S.2
  • 31
    • 0018545449 scopus 로고
    • How to Share a Secret
    • Shamir, A.: How to Share a Secret. Commun. ACM 22(11), 612-613 (1979)
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 32
    • 84937565289 scopus 로고    scopus 로고
    • Towards an Analysis of Onion Routing Security
    • Federrath, H, ed, Designing Privacy Enhancing Technologies, Springer, Heidelberg
    • Syverson, P., Tsudik, G., Reed, M., Landwehr, C.: Towards an Analysis of Onion Routing Security. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 96-114. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2009 , pp. 96-114
    • Syverson, P.1    Tsudik, G.2    Reed, M.3    Landwehr, C.4
  • 33
    • 38149136214 scopus 로고    scopus 로고
    • The Tor Project. Tor: anonymity online (accessed February 2007), http://tor.eff.org/
    • The Tor Project. Tor: anonymity online (accessed February 2007), http://tor.eff.org/
  • 34
    • 84945129491 scopus 로고    scopus 로고
    • Evidence that XTR Is More Secure than Supersingular Elliptic Curve Cryptosystems
    • Pfitzmann, B, ed, EUROCRYPT 2001, Springer, Heidelberg
    • Verheul, E.: Evidence that XTR Is More Secure than Supersingular Elliptic Curve Cryptosystems. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 195-210. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2045 , pp. 195-210
    • Verheul, E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.