期刊文献+

一种基于分组填充Mix策略的匿名通信机制

Anonymous communication mechanism based on group padding MIX approach
下载PDF
导出
摘要 Mix机制为实现匿名通信技术提供了可行的解决方案,但攻击者仍可以在一定程度上通过流量分析来获取通信关系。为了进一步提高Mix机制对抗信息量分析攻击的能力,提出了分组填充的思想,并基于分组填充Mix策略给出了一种新型匿名通信机制。算法分析和仿真实验表明,与传统Mix机制相比,新的基于分组填充的Mix机制,能在有效抵御信息量分析攻击的同时,进一步降低网络的额外带宽开销。 The Mix mechanism has provided a feasible solution to the realization of anonymous communication. But to a certain degree, the attackers can still obtain the correspondence relations through traffic analysis. In order to further improve the ability of Mix mechanism to resist the traffic analysis of message volume, a kind of scheme named group padding was proposed, and based on which, a new anonymous correspondence mechanism was designed. Algorithm analysis and the simulation results show that, compared with the traditional Mix mechanism, the newly proposed Mix mechanism based on group padding scheme can resist traffic analysis of message volume effectively, and needs lower extra bandwidth at the same time.
出处 《计算机应用》 CSCD 北大核心 2007年第7期1606-1608,共3页 journal of Computer Applications
基金 国家自然科学基金资助项目(60473031)
关键词 匿名通信 Mix机制 分组填充 网络安全 anonymous communication Mix approach group padding network security
  • 相关文献

参考文献18

  • 1眭鸿飞,陈松乔,陈建二,王建新,王伟平.基于重路由匿名通信系统的负载分析[J].软件学报,2004,15(2):278-285. 被引量:19
  • 2王伟平,陈建二,陈松乔,王建新.匿名通信中短距离优先分组重路由方法的研究[J].软件学报,2004,15(4):561-570. 被引量:17
  • 3高虎明,陈晓峰,王育民.一个新的(t,N-2)弹性的Mix Net[J].计算机学报,2003,26(10):1361-1365. 被引量:3
  • 4王继林,伍前红,陈德人,王育民.匿名技术的研究进展[J].通信学报,2005,26(2):112-118. 被引量:16
  • 5CHAUM D.Untraceable electronic mail,return addresses,and digital pseudonyms[J].Communications of the ACM,1981,24(2),84-90.
  • 6GOLDSCHLAG D,REED M,SYVERSON P.Onion routing for anonymous and private internet connections[J].Communications of the ACM,1999,42(2):39-41.
  • 7KESDOGAN D,EGNER J,BüSCHKES R.Stop-and-go MIXes:providing probabilistic anonymity in an open system[C]// Proceedings of the Second International Workshop on Information Hiding,LNCS 1525.Heidelberg:Springer-Verlag,1998:83-98.
  • 8SHERWOOD R,BHATTACHARJEE B,SRINIVASAN A.P5:a protocol for scalable anonymous communication[C]// Proceedings of the 2002 IEEE Symposium on Security and Privacy.Washington,DC,USA:IEEE Computer Society,2002:58-70.
  • 9FREEDMAN M J,MORRIS R.Tarzan:a peer-to-peer anonymizing network layer[C]// Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS 2002).Washington,DC:ACM Press,2002:193-206.
  • 10MOLLER U,COTTRELL L,PALFRADER P,et al.Mixmasterprotocol-version 2[S].2003.

二级参考文献44

  • 1Chaum D. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 1981, 24(2) ,84~88.
  • 2Reiter M K, Rubin A D. Crowdst Anonymity for Web Transaction. ACM Transactions on Information and System Security, 1998,1(1):66~92.
  • 3Syverson P F, Goldschlag D M, Reed M G. Anonymous connections and onion routing. IEEE Journal of Selected Areas in Commun. , 1998,16(4) : 482~494.
  • 4Pfitzmann A, Pfitzmann B. How to break the direct RSA-implementation of mixes. In:Advances in Cryptology—EUROCRYPT'89. Berlin: Springer-Verlag, 1989. 373~381.
  • 5Pfitzmann A, Pfitzmann B, Waidner M. ISDN-mixes: Untraceable communication with very small bandwidth overhead.In: Proceedings of the GI/ITG Conference on Communication in Distributed Systems,Mannheim, Germany, 1991. 451~463.
  • 6Ogata W, Kurosawa K, Sako K, Takatani K. Fault tolerant anonymous channel. In: Proceedings of ICICS'97, LNCS 1334,Berlin: Springer-Verlag, 1997, 440~ 444.
  • 7Abe M. Universally verifiable mix-net with verifieation work independent of the number of mix-eenters. In: Proceedings of EUROCRYPT' 98, LNCS 1403, Berlin: Springer-Verlag,1998, 437~447.
  • 8Abe M. A mix-network on permutation networks. In: Proceedings of ASIACRYPT' 99, LNCS 1716, Berlin: Springer-Verlag, 1999, 258~273.
  • 9Jakobsson M. A practical mix. In.. Proceedings of EUROCRYPT'98, LNCS 1403, Berlin: Springer-Verlag, 1998, 448~461.
  • 10Jakobsson M. Flash mixing. In: Proceedings of PODC' 99,ACM, 1999. 83~89.

共引文献45

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部