메뉴 건너뛰기




Volumn , Issue , 2011, Pages 175-186

Trust-based anonymous communication: Adversary models and routing algorithms

Author keywords

Anonymous communication; Onion routing; Privacy; Trust

Indexed keywords

ADVERSARY MODELS; ANONYMITY NETWORKS; ANONYMOUS COMMUNICATION; ONION ROUTING; ROUTE SELECTION; ROUTING SECURITY; ROUTING STRATEGIES; TRUST;

EID: 80755168359     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2046707.2046729     Document Type: Conference Paper
Times cited : (30)

References (51)
  • 2
    • 68949221468 scopus 로고    scopus 로고
    • Probabilistic and nondeterministic aspects of anonymity
    • R. Beauxis and C. Palamidessi. Probabilistic and nondeterministic aspects of anonymity. Theoretical Computer Science, 410(41):4006-4025, 2009.
    • (2009) Theoretical Computer Science , vol.410 , Issue.41 , pp. 4006-4025
    • Beauxis, R.1    Palamidessi, C.2
  • 3
    • 13644250069 scopus 로고    scopus 로고
    • Buses for anonymous message delivery
    • DOI 10.1007/s00145-002-0128-6
    • A. Beimel and S. Dolev. Buses for anonymous message delivery. Journal of Cryptology, 16(1):25-39, 2003. (Pubitemid 41201214)
    • (2003) Journal of Cryptology , vol.16 , Issue.1 , pp. 25-39
    • Beimel, A.1    Dolev, S.2
  • 6
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 4(2), 1981.
    • (1981) Communications of the ACM , vol.4 , Issue.2
    • Chaum, D.1
  • 7
    • 0023861309 scopus 로고
    • Dining cryptographers problem: Unconditional sender and recipient untraceability
    • D. Chaum. The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology: The Journal of the International Association for Cryptologic Research, 1(1):65-75, 1988. (Pubitemid 18606152)
    • (1988) Journal of Cryptology , vol.1 , Issue.1 , pp. 65-75
    • Chaum, D.1
  • 9
    • 35248866624 scopus 로고    scopus 로고
    • Mix-networks with restricted routes
    • R. Dingledine, editor PET 2003 Springer-Verlag, LNCS 2760
    • G. Danezis. Mix-networks with restricted routes. In R. Dingledine, editor, Privacy Enhancing Technologies: Third International Workshop, PET 2003, pages 1-17. Springer-Verlag, LNCS 2760, 2003.
    • (2003) Privacy Enhancing Technologies: Third International Workshop , pp. 1-17
    • Danezis, G.1
  • 14
    • 84957800033 scopus 로고    scopus 로고
    • Towards Measuring Anonymity
    • Privacy Enhancing Technologies
    • C. Díaz, S. Seys, J. Claessens, and B. Preneel. Towards measuring anonymity. In R. Dingledine and P. Syverson, editors, Privacy Enhancing Technologies, Second International Workshop, PET 2002, Revised Papers, pages 54-68. Springer-Verlag, LNCS 2482, 2003. (Pubitemid 36309879)
    • (2003) Lecture Notes in Computer Science , Issue.2482 , pp. 54-68
    • Diaz, C.1    Seys, S.2    Claessens, J.3    Preneel, B.4
  • 15
    • 84947287486 scopus 로고    scopus 로고
    • A Reputation System to Increase MIX-Net Reliability
    • Information Hiding
    • R. Dingledine, M. J. Freedman, D. Hopwood, and D. Molnar. A reputation system to increase MIX-net reliability. In I. S. Moskowitz, editor, Information Hiding: 4th International Workshop, IH 2001, pages 126-141, Pittsburgh, PA, USA, April 2001. Springer-Verlag, LNCS 2137. (Pubitemid 33367663)
    • (2001) Lecture Notes in Computer Science , Issue.2137 , pp. 126-141
    • Dingledine, R.1    Freedman, M.J.2    Hopwood, D.3    Molnar, D.4
  • 18
    • 34948854809 scopus 로고    scopus 로고
    • Deploying low-latency anonymity: Design challenges and social factors
    • September/October
    • R. Dingledine, N. Mathewson, and P. Syverson. Deploying low-latency anonymity: Design challenges and social factors. IEEE Security & Privacy, 5(5):83-87, September/October 2007.
    • (2007) IEEE Security & Privacy , vol.5 , Issue.5 , pp. 83-87
    • Dingledine, R.1    Mathewson, N.2    Syverson, P.3
  • 19
    • 84957023357 scopus 로고    scopus 로고
    • Reliable MIX Cascade Networks through Reputation
    • Financial Cryptography
    • R. Dingledine and P. Syverson. Reliable MIX cascade networks through reputation. In M. Blaze, editor, Financial Cryptography, 6th International Conference, FC 2002, pages 253-268. Springer-Verlag, LNCS 2357, 2003. (Pubitemid 36316784)
    • (2003) Lecture Notes in Computer Science , Issue.2357 , pp. 253-268
    • Dingledine, R.1    Syverson, P.2
  • 22
    • 77955872093 scopus 로고    scopus 로고
    • On anonymity in an electronic society: A survey of anonymous communication systems
    • M. Edman and B. Yener. On anonymity in an electronic society: A survey of anonymous communication systems. ACM Computing Surveys, 42(1), 2010.
    • (2010) ACM Computing Surveys , vol.42 , Issue.1
    • Edman, M.1    Yener, B.2
  • 23
    • 85076290610 scopus 로고    scopus 로고
    • A practical congestion attack on tor using long paths
    • Montreal, Canada, August USENIX Association
    • N. S. Evans, R. Dingledine, and C. Grothoff. A practical congestion attack on Tor using long paths. In Proceedings of the 18th USENIX Security Symposium, pages 33-50, Montreal, Canada, August 2009. USENIX Association.
    • (2009) Proceedings of the 18th USENIX Security Symposium , pp. 33-50
    • Evans, N.S.1    Dingledine, R.2    Grothoff, C.3
  • 27
    • 35048865464 scopus 로고    scopus 로고
    • Dining cryptographers revisited
    • Interlaken, Switzerland, May Springer-Verlag, LNCS 3027
    • P. Golle and A. Juels. Dining cryptographers revisited. In Advances in Cryptology - EUROCRYPT 2004, pages 456-473, Interlaken, Switzerland, May 2004. Springer-Verlag, LNCS 3027.
    • (2004) Advances in Cryptology - EUROCRYPT 2004 , pp. 456-473
    • Golle, P.1    Juels, A.2
  • 29
    • 84957796461 scopus 로고    scopus 로고
    • Fingerprinting websites using traffic analysis
    • R. Dingledine and P. Syverson, editors PET 2002 San Francisco, CA, USA, April Springer-Verlag, LNCS 2482
    • A. Hintz. Fingerprinting websites using traffic analysis. In R. Dingledine and P. Syverson, editors, Privacy Enhancing Technologies: Second International Workshop, PET 2002, pages 171-178, San Francisco, CA, USA, April 2002. Springer-Verlag, LNCS 2482.
    • (2002) Privacy Enhancing Technologies: Second International Workshop , pp. 171-178
    • Hintz, A.1
  • 31
    • 70350543794 scopus 로고    scopus 로고
    • More anonymous onion routing through trust
    • CSF 2009 Port Jefferson, New York, July IEEE Computer Society
    • A. Johnson and P. Syverson. More anonymous onion routing through trust. In 22nd IEEE Computer Security Foundations Symposium, CSF 2009, pages 3-12, Port Jefferson, New York, July 2009. IEEE Computer Society.
    • (2009) 22nd IEEE Computer Security Foundations Symposium , pp. 3-12
    • Johnson, A.1    Syverson, P.2
  • 33
    • 34547350876 scopus 로고    scopus 로고
    • Inferring the source of encrypted HTTP connections
    • DOI 10.1145/1180405.1180437, 1180437, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
    • M. Liberatore and B. N. Levine. Inferring the source of encrypted HTTP connections. In R. N. Wright, S. De Capitani di Vimercati, and V. Shmatikov, editors, CCS'06: Proceedings of the 13th ACM Conference on Computer and Communications Security, pages 255-263. ACM Press, 2006. (Pubitemid 47131374)
    • (2006) Proceedings of the ACM Conference on Computer and Communications Security , pp. 255-263
    • Liberatore, M.1    Levine, B.N.2
  • 34
    • 24344478834 scopus 로고    scopus 로고
    • Practical traffic analysis: Extending and resisting statistical disclosure
    • Privacy Enhancing Technologies - 4th International Workshop, PET 2004
    • N. Mathewson and R. Dingledine. Practical traffic analysis: Extending and resisting statistical disclosure. In D. Martin and A. Serjantov, editors, Privacy Enhancing Technologies, 4th International Workshop, PET 2004, Revised Selected Papers, pages 17-34. Springer Verlag, LNCS 3424, 2005. (Pubitemid 41251994)
    • (2005) Lecture Notes in Computer Science , vol.3424 , pp. 17-34
    • Mathewson, N.1    Dingledine, R.2
  • 36
    • 27544454707 scopus 로고    scopus 로고
    • Low-cost traffic analysis of Tor
    • Proceedings - 2005 IEEE Symposium on Security and Privacy, IEEE S and P 2005
    • S. J. Murdoch and G. Danezis. Low-cost traffic analysis of Tor. In Proceedings of the 2005 IEEE Symposium on Security and Privacy, pages 183-195, 2005. (Pubitemid 41543655)
    • (2005) Proceedings - IEEE Symposium on Security and Privacy , pp. 183-195
    • Murdoch, S.J.1    Danezis, G.2
  • 44
    • 84957802536 scopus 로고    scopus 로고
    • Towards an Information Theoretic Metric for Anonymity
    • Privacy Enhancing Technologies
    • A. Serjantov and G. Danezis. Towards an information theoretic metric for anonymity. In R. Dingledine and P. Syverson, editors, Privacy Enhancing Technologies, Second International Workshop, PET 2002, Revised Papers, pages 41-53. Springer-Verlag, LNCS 2482, 2003. (Pubitemid 36309878)
    • (2003) Lecture Notes in Computer Science , Issue.2482 , pp. 41-53
    • Serjantov, A.1    Danezis, G.2
  • 48
    • 84937565289 scopus 로고    scopus 로고
    • Towards an Analysis of Onion Routing Security
    • Designing Privacy Enhancing Technologies
    • P. Syverson, G. Tsudik, M. Reed, and C. Landwehr. Towards an analysis of onion routing security. In H. Federrath, editor, Designing Privacy Enhancing Technologies: International Workshop on Design Issues in Anonymity and Unobservability, Proceedings, pages 96-114. Springer-Verlag, LNCS 2009, July 2001. (Pubitemid 33241789)
    • (2001) Lecture Notes in Computer Science , Issue.2009 , pp. 96-114
    • Syverson, P.1    Tsudik, G.2    Reed, M.3    Landwehr, C.4
  • 49
    • 80755145252 scopus 로고    scopus 로고
    • The Tor project home page. https://www.torproject.org/.
  • 50
    • 80755134989 scopus 로고    scopus 로고
    • April
    • Tor metrics portal. https://metrics.torproject.org/, April 2011.
    • (2011)
  • 51
    • 24344450770 scopus 로고    scopus 로고
    • On flow correlation attacks and countermeasures in mix networks
    • Privacy Enhancing Technologies - 4th International Workshop, PET 2004
    • Y. Zhu, X. Fu, B. Graham, R. Bettati, and W. Zhao. On flow correlation attacks and countermeasures in mix networks. In Proceedings of Privacy Enhancing Technologies workshop (PET 2004), pages 207-225, 2004. (Pubitemid 41252005)
    • (2005) Lecture Notes in Computer Science , vol.3424 , pp. 207-225
    • Zhu, Y.1    Fu, X.2    Graham, B.3    Bettati, R.4    Zhao, W.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.