期刊文献+

洋葱路由包的封装技术研究 被引量:9

Encapsulation of the Onion Routing
下载PDF
导出
摘要 洋葱路由技术(Onion Routing)是为了阻止在公用网络上进行窃听和流量分析,在Internet上提供隐藏通信的一种基础设施,它可以在公开的计算机网络中隐藏通信双方的关系及通信目的,对通信内容进行有效地保护。文章针对洋葱包头的实现机制,利用加密和签名技术,结合分层和嵌套的组合,提出了洋葱包的四种封装方式,即分层加密和签名、分层加密与嵌套签名、嵌套加密与分层签名、嵌套加密和签名,在比较了它们优缺点的基础上提出了实现源路由技术的方案。 Onion routing is used for private communication over a public network,it provides anonymous connection that is strongly resistant to both eavesdropping and traffic analysis,it is an infrastructure that provides hiding communication over Internet,the onion router can hide request and responder's information,protect the content efficiently.In this paper,based on the onion routing,combined with encryption and signature,it presents four encapsulatting approaches and compare their advantage and disadvantage,four encapsulatting approaches are atomic encryptions and signatures, atomic encryptions and nested signatures,nested encryptions and atomic signatures,nested encryptions and signatures.
作者 吴振强 杨波
出处 《计算机工程与应用》 CSCD 北大核心 2002年第20期150-153,204,共5页 Computer Engineering and Applications
基金 国家自然科学基金资助项目(编号:69972034 60132030) 部委重点实验室基金资助项目(编号:99JS06.3.1.DZ0112) 陕西师范大学青年科学基金资助
关键词 洋葱路由包 封装技术 计算机网络 网络安全 匿名通信 Network Security,Anonymous Communication,Onion Routing,Encapsulation
  • 相关文献

参考文献2

二级参考文献3

  • 1石纯一,人工智能原理,1993年,82页
  • 2王育民,通信网的安全.理论与技术,1999年
  • 3Bao F,Proc 1st Int Workshop on Practice and Theoryin Public Key Cryptography,1998年,55页

共引文献24

同被引文献48

  • 1王继林,伍前红,陈德人,王育民.匿名技术的研究进展[J].通信学报,2005,26(2):112-118. 被引量:16
  • 2段桂华,杨路明,王伟平,宋虹.一种基于洋葱路由的可撤销匿名通信方案[J].计算机工程与应用,2005,41(13):7-9. 被引量:4
  • 3吴艳辉,王伟平,陈建二.匿名通信研究综述[J].小型微型计算机系统,2007,28(4):583-588. 被引量:15
  • 4Reed M, Syverson P, Goldschlag D. Anonymous connection and onion routing[ J]. IEEE Journal on Selected Areas in Communications, 1998,16 (4) :482-492.
  • 5Joan Feigenbaum,Aaron Johnson,Patti Syverson. A model of on ion routing with provable anonymity[ C ]// Financial Cryptography and Data Security,11th International Conferenee,2O07.
  • 6Uwe Hermann. HOWTO: Anonymous communication with Tor[ EB/OL]. http://www, hermann-uwe, de./blog/howtoanonymous -communication-with-tor-some -hints -and-some - pitfalls, 2006-03-06,.
  • 7Mitesh Dhanjani. Tor: An anonymous Internet communication system[ EB/OL]. http ://tor. eft. org/,2005-01-20.
  • 8CHAUM D L. Untraceable Electronic Mail, Return Addresses, and Digital Pscudonyms[J]. Communications of the ACM, 1981, 24(2): 84-88.
  • 9REED M G, SYVERSON P F. Anonymous Connections and Onion Routing[J]. IEEE Journal on Selected Areas in Communication-Special Issue on Copyright and Privacy Protection, 1998, 16(4): 482-494.
  • 10JORIS Claessens, CLAUDIA Diaz, CAROLINE Goemans, et al. Revocable Anonymous Access to the Internet [J]. Journal of Internet Research: Electronic Networking Applications and Policy, 2003 : 13(4) : 242-258.

引证文献9

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部