Public-Key Based Routing In Internet For Anonymous Data Communication

被引:0
|
作者
Mirzaei, Reza [1 ]
Farahani, Reza [1 ]
Yazdani, Naser [1 ]
机构
[1] Univ Tehran, Sch Elect & Comp Engn, Tehran, Iran
关键词
Anonymity; Public-Key; Routing; Overlay Networks; Tor; Tree Structure;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We propose a new decentralized network structure for anonymous communications based on public-key addressing. Our structure, called PK-Routing (Public-Key Routing) consists of four sub-structures. These sub-structures can be used based on sender's choice. The proposed structure is distinguished from other schemes by two features. First, it is constructed as a virtual peer-to-peer network that maintains traditional networks harmony. The second feature, showing the flexibility of our structure, allows each participant to trade-off between type and degree of anonymity for communication efficiency. We describe PK-Routing structure and present analysis and comparison of its anonymity with other works.
引用
收藏
页码:58 / 64
页数:7
相关论文
共 50 条
  • [1] Anonymous public-key certificates for anonymous and fair document exchange
    Zhang, N
    Shi, Q
    Merabti, M
    [J]. IEE PROCEEDINGS-COMMUNICATIONS, 2000, 147 (06): : 345 - 350
  • [2] AN RSA BASED PUBLIC-KEY CRYPTOSYSTEM FOR SECURE COMMUNICATION
    VENKAIAH, VCH
    [J]. PROCEEDINGS OF THE INDIAN ACADEMY OF SCIENCES-MATHEMATICAL SCIENCES, 1992, 102 (02): : 147 - 153
  • [3] Fuzzy Public-Key Encryption Based on Biometric Data
    Cui, Hui
    Au, Man Ho
    Qin, Baodong
    Deng, Robert H.
    Yi, Xun
    [J]. PROVABLE SECURITY, PROVSEC 2017, 2017, 10592 : 400 - 409
  • [4] Profiles and protocols for the Internet Public-Key Infrastructure
    Adams, C
    Lloyd, S
    [J]. PROCEEDINGS OF THE SIXTH IEEE COMPUTER SOCIETY WORKSHOP ON FUTURE TRENDS OF DISTRIBUTED COMPUTING SYSTEMS, 1997, : 220 - 224
  • [5] Anonymous Authentication from Public-Key Encryption Revisited (Extended Abstract)
    Slamanig, Daniel
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, 2011, 7025 : 247 - 249
  • [6] Virtual microscopy and public-key cryptography for Internet telepathology
    Strauss, JS
    Felten, CL
    Okada, DH
    Marchevsky, AM
    [J]. JOURNAL OF TELEMEDICINE AND TELECARE, 1999, 5 (02) : 105 - 110
  • [7] Adaptively anonymous public-key broadcast encryption scheme without random oracle
    Wang, Hao
    Wu, Lei
    [J]. Journal of Networks, 2014, 9 (06) : 1656 - 1663
  • [8] Public-Key Based Efficient Key Distribution in Bluetooth
    Rahman, Saif
    He, Yiruo
    Wu, Huapeng
    [J]. PROCEEDINGS OF THE 2013 10TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2013, : 727 - 728
  • [9] Revocation-free public-key encryption based on security-mediated public-key infrastructure
    Lo, C. -M.
    Hwang, T.
    Li, C. -M.
    [J]. IET INFORMATION SECURITY, 2007, 1 (03) : 134 - 141
  • [10] A lattice-based public-key cryptosystem
    Cai, JY
    Cusick, TW
    [J]. INFORMATION AND COMPUTATION, 1999, 151 (1-2) : 17 - 31