메뉴 건너뛰기




Volumn 13, Issue 4, 2010, Pages

Pairing-based onion routing with improved forward secrecy

Author keywords

Anonymous key agreement; Forward secrecy; Onion routing; Pairing based cryptography; Tor

Indexed keywords

FORWARD SECRECY; KEY AGREEMENT; ONION ROUTING; PAIRING-BASED CRYPTOGRAPHY; TOR;

EID: 78651394431     PISSN: 10949224     EISSN: 15577406     Source Type: Journal    
DOI: 10.1145/1880022.1880023     Document Type: Article
Times cited : (25)

References (37)
  • 1
    • 34547358080 scopus 로고    scopus 로고
    • London Mathematical Society Lecture Note Series, Cambridge University Press, Cambridge, UK
    • BLAKE, I., SEROUSSI, G., AND SMART, N. P., Eds. 2005. Advances in Elliptic Curve Cryptography. London Mathematical Society Lecture Note Series, No. 317, Cambridge University Press, Cambridge, UK. 183-252.
    • (2005) Advances in Elliptic Curve Cryptography , Issue.317 , pp. 183-252
    • Blake, I.1    Seroussi, G.2    Smart, N.3
  • 5
    • 34547218499 scopus 로고    scopus 로고
    • A forward-secure public-key encryption scheme
    • CANETTI, R., HALEVI, S., AND KATZ, J. 2007. A forward-secure public-key encryption scheme. J. Cryptol. 20, 3, 265-294.
    • (2007) J. Cryptol. , vol.20 , Issue.3 , pp. 265-294
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 6
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • CHAUM, D. 1981. Untraceable electronic mail, return addresses, and digital pseudonyms. Comm. ACM 4, 2, 84-88.
    • (1981) Comm. ACM , vol.4 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 9
    • 0010275933 scopus 로고    scopus 로고
    • DAI, W. 1998. PipeNet 1.1. http://www.weidai.com/pipenet.txt.
    • (1998) PipeNet 1.1
    • Dai, W.1
  • 12
    • 29244438183 scopus 로고    scopus 로고
    • Provably secure non-interactive key distribution based on pairings
    • DUPONT, R. AND ENGE, A. 2006. Provably secure non-interactive key distribution based on pairings. Discr. Appl. Math. 154, 2, 270-276.
    • (2006) Discr. Appl. Math. , vol.154 , Issue.2 , pp. 270-276
    • Dupont, R.1    Enge, A.2
  • 14
    • 72849147698 scopus 로고    scopus 로고
    • On the security of the tor authentication protocol
    • Lecture Notes in Computer Science, Springer
    • GOLDBERG, I. 2006. On the security of the tor authentication protocol. In Proceedings of the 6th Workshop on Privacy Enhancing Technologies (PET'06). Lecture Notes in Computer Science, vol. 4258, Springer, 316-331.
    • (2006) Proceedings of the 6th Workshop on Privacy Enhancing Technologies (PET'06) , vol.4258 , pp. 316-331
    • Goldberg, I.1
  • 16
    • 66249092571 scopus 로고    scopus 로고
    • Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks
    • HUANG, D. 2007. Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks. Int. J. Secur. Netw. 2, 3-4, 272-283.
    • (2007) Int. J. Secur. Netw. , vol.2 , Issue.3-4 , pp. 272-283
    • Huang, D.1
  • 26
    • 35248844472 scopus 로고    scopus 로고
    • Provably secure public-key encryption for length-preserving chaumian mixes
    • Lecture Notes in Computer Science, Springer
    • MÖLLER, B. 2003. Provably secure public-key encryption for length-preserving chaumian mixes. In Proceedings of the Cryptographers Track at the RSA Conference (CT-RSA'03). Lecture Notes in Computer Science, vol. 2612, Springer, 244-262.
    • (2003) Proceedings of the Cryptographers Track at the RSA Conference (CT-RSA'03) , vol.2612 , pp. 244-262
    • Möller, B.1
  • 28
    • 38349040011 scopus 로고    scopus 로고
    • Improving efficiency and simplicity of tor circuit establishment and hidden services
    • Lecture Notes in Computer Science, Springer
    • ØVERLIER, L. AND SYVERSON, P. 2007. Improving efficiency and simplicity of tor circuit establishment and hidden services. In Proceedings of the 7th Privacy Enhancing Technologies Symposium (PETS'07). Lecture Notes in Computer Science, vol. 4776, Springer, 134-152.
    • (2007) Proceedings of the 7th Privacy Enhancing Technologies Symposium (PETS'07) , vol.4776 , pp. 134-152
    • Øverlier, L.1    Syverson, P.2
  • 34
    • 0018545449 scopus 로고
    • How to share a secret
    • SHAMIR, A. 1979. How to share a secret. Comm. ACM 22, 11, 612-613.
    • (1979) Comm. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 36
    • 84865342243 scopus 로고    scopus 로고
    • TOR PROJECT. 2008. Tor: Anonymity online. https://www.torproject.org/.
    • (2008) Tor: Anonymity Online
  • 37
    • 84945129491 scopus 로고    scopus 로고
    • Evidence that XTR is more secure than supersingular elliptic curve cryptosystems
    • Lecture Notes in Computer Science, Springer
    • VERHEUL, E. 2001. Evidence that XTR is more secure than supersingular elliptic curve cryptosystems. In Proceedings of the International Cryptology Conference, Advances in Cryptology (Eurocrypt'01). Lecture Notes in Computer Science, vol. 2045, Springer, 195-210.
    • (2001) Proceedings of the International Cryptology Conference, Advances in Cryptology (Eurocrypt'01) , vol.2045 , pp. 195-210
    • Verheul, E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.