期刊文献+

一种洋葱地址快速生成算法Shallot^(++)

Fast Algorithm for Onion Address Generation Shallot++
下载PDF
导出
摘要 匿名网络Tor提供了两种操作方式:Web服务方式和洋葱服务(或隐藏服务)方式.为了保证服务器端的匿名,“隐藏”洋葱服务,其域名(或洋葱地址)采用公钥字符串.由于它不具有可读性、难以记忆,是一种“非人类”的域名,一定程度上影响了网络服务的推广.为了使域名具有一定可读性、便于记忆,在不降低安全性的前提下,设计具有指定字符的onion域名.国外许多学者进行了大量研究,取得了一定的成果,其中最经典的是Shallot算法.在应用研究过程中发现Shallot算法存在许多问题,在分析Shallot算法的基础上,设计了一种洋葱地址快速生成算法Shallot++,对于指定字符串,Shallot++比shallot算法可以更快地生成符合要求的域名,仿真实验和算法分析证明了结论的正确性和效率性. Anonymous network Tor provides two modes of operation:Web service and onion service(or hidden service).To ensure the server-side's anonymity and to hide the onion service,its domain name(or onion address)uses a string generated with a public key.Because it is not readable and difficult to remember,it is a“non-human”domain name,which affects the promotion of network services to some extent.In order to make the domain name somewhat readable and easy to remember,the onion domain name with the specified characters is designed without reducing the security.Many foreign scholars have done a lot of research and achieved certain results,the most classic of which is the Shallot algorithm.In the process of application and research,there are many problems in the Shallot algorithm.On the basis of analyzing the Shallot algorithm,we designed a fast onion address generation algorithm Shallot++.For the specified string,Shallot++can generate the qualified domain name faster than the Shallot algorithm,the Simulation experiments and algorithm analysis prove the correctness and efficiency of our conclusions.
作者 魏海州 杨云 李凌燕 WEI Hai-zhou;YANG Yun;LI Ling-yan(College of Information Engineering,Yangzhou University,Yangzhou 225127,China)
出处 《小型微型计算机系统》 CSCD 北大核心 2021年第1期117-121,共5页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(61872312)资助 江苏省产学研前瞻性联合项目(BY2016069-16)资助。
关键词 TOR .onion域名 公钥 shallot算法 RSA Tor onion domain name public key shallot algorithm RSA
  • 相关文献

参考文献6

二级参考文献28

  • 1陈周国,蒲石,祝世雄.匿名网络追踪溯源综述[J].计算机研究与发展,2012,49(S2):111-117. 被引量:14
  • 2吴艳辉,王伟平,陈建二.匿名通信研究综述[J].小型微型计算机系统,2007,28(4):583-588. 被引量:15
  • 3Claessens J, Diaz C, Goemans C. et al. Revocable anonymous access to the Internet [J]. Internet Research: Electronic Networking Application and Policy, 2003, 13(4) :242-258.
  • 4Serjantow A. Anon:cmizing censorship resistant systems [C] //Proc of the 1st Int Peer-to-Peer Systems Workshop. Berlin: Springer, 2002:111-120.
  • 5Goldschlag D, Reed M, Syverson P. Onion routing for anonymous and private Internet connections [J].Communications of the ACM, 1999, 42(2): 39-41.
  • 6Dingledine R, Mathewson N, Syverson P. Tor: The second- generation onion router [C] //Proe of the 13th USENIX Security Symp. Berkeley: USENIX Association, 2004: 303- 320.
  • 7Reiter M K, Rubin A D. Crowds: Anonymity for Web transactions [J]. ACM Trans on Information and System Security, 1998, 1(1): 66-92.
  • 8Freedman M J, Morris R. Tarzan: A peer-to-peer anonymizing network layer [C] //Proe of the 9th ACM Conf on Computer and Communications Security. New York: ACM, 2002: 193-206.
  • 9Danezis G, Dingledine R, Mathewson N. Mixminion: Design of a type Ⅲ anonymous remailer protocol [C] //Proc of the 2003 IEEE Symp on Security and Privacy. Los Alamitos, CA: IEEE Computer Society, 2003:2-15.
  • 10Sherwood R, Bhattacharjee B, Srinivasan A. P5: A protocol for scalable anonymous communication [J]. Journal of Computer Security, 2005, 13(6): 839-876.

共引文献71

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部