메뉴 건너뛰기




Volumn , Issue , 2012, Pages 369-385

Provably secure and practical onion routing

Author keywords

Onion routing; Security proof; Universal compos ability

Indexed keywords

ANONYMITY ANALYSIS; BLACK-BOX MODEL; COMPREHENSIVE ANALYSIS; CRYPTOGRAPHIC PRIMITIVES; EXACT SECURITY; FORWARD SECRECY; KEY EXCHANGE PROTOCOLS; ONION ROUTING; PROCESSING ALGORITHMS; PROVABLY SECURE; SECURITY DEFINITIONS; SECURITY PROOFS; SYMMETRIC ENCRYPTION; UNIVERSAL COMPOS-ABILITY; WEB ACCESS;

EID: 84866946287     PISSN: 10636900     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSF.2012.32     Document Type: Conference Paper
Times cited : (38)

References (30)
  • 2
    • 84937550984 scopus 로고    scopus 로고
    • Provably secur password-authenticated key exchange using diffie-hellman
    • V. Boyko, P. D. MacKenzie, and S. Patel, "Provably Secur Password-Authenticated Key Exchange Using Diffie-Hellman," in EUROCRYPT, 2000, pp. 156-171.
    • (2000) EUROCRYPT , pp. 156-171
    • Boyko, V.1    MacKenzie, P.D.2    Patel, S.3
  • 7
    • 1542593353 scopus 로고
    • Authentication and authenticated key exchanges
    • W. Diffie, P. C. van Oorschot, and M. J. Wiener, "Authentication and Authenticated Key Exchanges," Des. Codes Cryptography, vol. 2, no. 2, pp. 107-125, 1992.
    • (1992) Des. Codes Cryptography , vol.2 , Issue.2 , pp. 107-125
    • Diffie, W.1    Van Oorschot, P.C.2    Wiener, M.J.3
  • 12
  • 14
    • 84876167337 scopus 로고    scopus 로고
    • Anonymity and one-way authentication in key exchange protocols
    • proposal for Tor
    • I. Goldberg, D. Stebila, and B. Ustaoglu, "Anonymity and one-way authentication in key exchange protocols," Designs, Codes and Cryptography, pp. 1-25, 2012, proposal for Tor: https://gitweb.torproject.org/torspec.git/ blob/HEAD: /proposals/ideas/xxx-ntor-handshake.txt.
    • (2012) Designs, Codes and Cryptography , pp. 1-25
    • Goldberg, I.1    Stebila, D.2    Ustaoglu, B.3
  • 15
    • 84880888233 scopus 로고    scopus 로고
    • Session-key generation using human passwords only
    • O. Goldreich and Y. Lindell, "Session-Key Generation Using Human Passwords Only," in CRYPTO, 2001, pp. 408-432.
    • (2001) CRYPTO , pp. 408-432
    • Goldreich, O.1    Lindell, Y.2
  • 18
    • 79960051711 scopus 로고    scopus 로고
    • Possibility and impossibility results for selective decommitments
    • D. Hofheinz, "Possibility and Impossibility Results for Selective Decommitments," J. Cryptology, vol. 24, no. 3, pp. 470-516, 2011.
    • (2011) J. Cryptology , vol.24 , Issue.3 , pp. 470-516
    • Hofheinz, D.1
  • 22
    • 78651394431 scopus 로고    scopus 로고
    • Pairing-based onion routing with improved forward secrecy
    • A. Kate, G. M. Zaverucha, and I. Goldberg, "Pairing-Based Onion Routing with Improved Forward Secrecy," ACM Trans. Inf. Syst. Secur., vol. 13, no. 4, p. 29, 2010.
    • (2010) ACM Trans. Inf. Syst. Secur. , vol.13 , Issue.4 , pp. 29
    • Kate, A.1    Zaverucha, G.M.2    Goldberg, I.3
  • 25
    • 0032074579 scopus 로고    scopus 로고
    • Anonymous connections and onion routing
    • M. Reed, P. Syverson, and D. Goldschlag, "Anonymous Connections and Onion Routing," IEEE J-SAC, vol. 16, no. 4, pp. 482-494, 1998.
    • (1998) IEEE J-SAC , vol.16 , Issue.4 , pp. 482-494
    • Reed, M.1    Syverson, P.2    Goldschlag, D.3
  • 26
    • 3042662497 scopus 로고    scopus 로고
    • Probabilistic analysis of an anonymity system
    • V. Shmatikov, "Probabilistic analysis of an anonymity system," Journal of Computer Security, vol. 12, no. 3-4, pp. 355-377, 2004.
    • (2004) Journal of Computer Security , vol.12 , Issue.3-4 , pp. 355-377
    • Shmatikov, V.1
  • 28
    • 84866896914 scopus 로고    scopus 로고
    • accessed Nov 2011
    • "The Tor Project," https://www.torproject.org/, 2003, accessed Nov 2011.
    • (2003) The Tor Project
  • 30
    • 72849140470 scopus 로고    scopus 로고
    • Effective attacks in the tor authentication protocol
    • Y. Zhang, "Effective attacks in the tor authentication protocol," in NSS '09, 2009, pp. 81-86.
    • (2009) NSS '09 , pp. 81-86
    • Zhang, Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.