期刊文献+

重路由匿名通信研究进展与展望 被引量:1

Research and Development of Rerouting-Based Anonymous Communication
下载PDF
导出
摘要 如同人们越来越关心自己的隐私和安全问题一样,如何保护网络通信中的个人信息免遭破坏也引起了人们的重视。重路由匿名通信技术可以通过一定的方法将数据流中的通信关系和通信模式隐藏,使对手无法直接获知或推测双方的通信关系或通信的一方,可以较好地实现通信中个人信息的保护。本文综述了目前国内外重路由匿名通信技术的发展现状,并就将来该领域的可能发展趋势作了探讨。 As people are concerned about their privacy and safe, how to protect their personal information on network has caused more and more attention. The technique of rerouting-based anonymous communication may hide the communication relation and the mode, make adversary not to learn the relation or one side of communication, and realize the protection of communication information. This paper describes the development on the domestic and international rerouting-based anonymous communication, and discusses the possible development of the anonymous communication.
出处 《电信科学》 北大核心 2006年第5期49-52,共4页 Telecommunications Science
基金 华为基金资助项目(No.YBDC2004013) 国家自然科学基金资助项目(No.60473001)
关键词 网络安全 匿名通信 重路由 network security, anonymous communication, rerouting
  • 相关文献

参考文献20

  • 1Alan O,Karlton P,Paul C.The SSL protocol version 3.Internet-Draft,IETF,1996
  • 2Pfitzmann A,Kohntopp M.Federrath H (ed).Anonymity,unobservability and pseudonymity:a proposal for terminology.In:LNCS 2009,Springer-Verlag,Berlin Heidelberg,July 2000
  • 3Chaum D.Untraceable electronic mail,return addresses,and digital pseudonyms.Communications of the ACM,1981,4(2):84~88
  • 4Chaum D.The dining cryptographers problem:unconditional sender and recipient untraceability.Journal of Cryptography,1988,1(1):65~75
  • 5Berthold H,Kopsell S.Hnnes Federath (ed).Web mixes:a system for anonymous and unobservable Internet access.In:LNCS 2009,Springer-Verlag Heidelberg,July 2001
  • 6Goldschlag D,Reed M,Syverson P.Onion routing for anonymous and private Internet connections.Communications of the ACM,1999,42(2):39~41
  • 7Dolev S,Ostrovsky R.Xor-Trees for efficient anonymous multicast and reception.ACM Transaction on Information and System Security,2000,3(2):63~84
  • 8The Anonymizer,http://www.anonymizer.com/
  • 9Dingledine R,Mathewson N,Syverson P.TOR:the second-generation onion router.In:Proceedings of the 13th USENIX Security Symposium,Washington,DC,USA,August 2004
  • 10赵福祥,赵红云,王育民,杨世平.一个采用分段验证签密隐蔽路由的设计与实现[J].电子学报,2002,30(7):995-998. 被引量:1

二级参考文献24

  • 1[1]Chaum D.The dining cryptographers problem: unconditional sender and recipient untraceability [J].Journal of Crptology,1988,(1):65-75.
  • 2[2]Brands S.Untraceable off-line cash in wallet with observers [A].Proc.of 13th Annual Inter.Cryptology Conf.(Crypto'93) [C].Berlin:Springer-Verlag,1993.302-318.
  • 3[3]Reed M,Syverson P,Goldschlag D.Protocols using anonymous connections:mobile applications [A].Security Protocols,Proc.LNCS Vol 1361 [C].Berlin:Springer-Verlag,1998.13-23.
  • 4[4]Goldschlag D,Reed M,Syverson.Hiding routing information [A].Anderson R,ed.Information Hiding,First Inter.Informatina Hiding Workshop Proceedings LNCS Vol 1174 [C].Berlin:Springer-Verlag,1996.137-150.
  • 5[5]Goldschlag D,Reed M,Syverson.Onion routing for anonymous and private Internet conections [J].Communication of the ACM,1999,42(2):39-41.
  • 6[6]Seo M,Kim K.Electronic funds transfer protocol using domain-verifiable signcryption scheme [A].JooSeok Song ed.Information Secunity and Cryptology-ICISC'99,Proc.LNCS Vol 1787 [C].Berlin:Springer-Verlag,2000.269-277.
  • 7[7]Bao F,Deng R H.A signcryption scheme with signature directly verifiable by public key [A].Hideki Imai,Yuliang Zheng eds.1st Inter.Workshop on Practice and Theory in Public Key Cryptography (PKC'98) ,Proc.LNCS Vol 1431 [C].Berlin:Springer-Verlag,1998.55-59.
  • 8[8]Gamage C,Leiwo J,Zheng Y.Encrypted message authentication by firewalls [A].2nd Inter.Workshop on Practice and Theory in Public Key Cryptography (PKC'99) Proc.LNCS Vol1560 [C].Berlin:Springer-Verlag,1999.69-81.
  • 9[9]Zheng Y.Digital signcryption or how to achieve cost(signature and encrytion)《《cost(signature)+cost(encrytion) [A].Advances in Cryptology-CRYPTO'97,Proc.LNCS Vol 1294 [C].Berllin:Sringer-Verlag,1997.165-179.
  • 10[10]Zheng Y.signcryption and its application in efficient public key solutions [A].Information Security Workshop(ISW'97),Proc.LNCS Vol 1396 [C].Berlin:Springer-Verlag,1998.291-312.

共引文献39

同被引文献3

  • 1[1]Dingledine R,Freedman,Molnar D.The Free Haven Project:Distributed Anonymous Storage Service[A].FEDERRATH H,Ed.Designing Privacy Enhancing Technologies:Design Issues in Anonymity and Observability,LNCS 2009[C].Springer-Verlag,2000.
  • 2[2]Sharad Goel,Mark Robson,Milo Polte et al.Herbivore:A Scalable and Efficient Protocol for Anonymous Communication[M].TR 2003-1890,Cornell University,2003-02.
  • 3[3]Guan Y,Fu X,Bettati R,et al.A optimal strategy for anonymous communication[R].Technical Report:tr2002-3-1,Dept.of Computer Science Texas A&M University,November,2001.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部