Back to Results
First PageMeta Content
Learning with errors / Machine learning / Diffie–Hellman key exchange / Transport Layer Security / XTR / Transmission Control Protocol / Onion routing / RSA / Cryptography / Cryptographic protocols / Electronic commerce


Post-Quantum Secure Onion Routing (Future Anonymity in Today’s Budget) Satrajit Ghosh† † Aniket Kate‡
Add to Reading List

Document Date: 2015-01-06 03:15:24


Open Document

File Size: 456,69 KB

Share Result on Facebook

City

Kolkata / Introduction Lattice / /

Company

eB sA / 2eB sA / pB sA / Tor / /

Country

Germany / India / /

Currency

pence / /

/

Event

FDA Phase / Product Recall / Product Issues / /

Facility

Indian Statistical Institute / Saarland University / /

IndustryTerm

authentication protocol / search version / public key infrastructure / randomized signal generation algorithm / public-key infrastructure / hybrid lattice-based onion routing protocol / employed ntor protocol / agreement protocol / key exchange protocols / real-world cryptographic protocols / cryptographic infrastructure / secure session key agreement protocols / interactive forward-secret key-exchange protocol / directory infrastructure / employed key agreement protocol / lattice based protocols / cryptographic applications / secure protocol / real life systems / lattice-based key exchange protocols / Internet-based destinations / ntor protocol / anonymous web browsing / realworld applications / communication networks / overlay network / require completely changing the public key infrastructure / constructed using the Tor authentication protocol / /

Organization

Pi / Saarland University / Indian Statistical Institute / /

Person

Bob / Alice / /

Position

randomness extractor / extractor / Prime Minister / deterministic extractor / forward / /

Product

corresponding concept of robust extractors / Section / /

ProgrammingLanguage

R / /

Technology

authentication protocol / public key infrastructure / 1W-AKE protocols / 1W-AKE protocol / interactive forward-secret key-exchange protocol / HybridOR protocol / above AKE protocol / lattice-based 1W-AKE protocol / ntor protocol / key exchange protocol / hybrid 1W-AKE protocol / PKI / randomized signal generation algorithm / key agreement protocol / SetUp algorithm / lattice-based key exchange protocols / known 1W-AKE protocols / CPA-secure RSA encryption / private key / 3 The ntor Protocol / machine learning / secret key / employed key agreement protocol / PPT algorithms / SSL / hybrid lattice-based onion routing protocol / 1W-AKE algorithm / public-key infrastructure / currently employed ntor protocol / ring-LWE based key exchange protocols / encryption / cryptography / secure 1W-AKE protocol / TLS protocol / public key / secure AKE protocol / OR protocol / correct 1W-AKE protocol / lattice-based AKE protocol / 1W-AKE secure protocol / TAP protocol / provably secure session key agreement protocols / two separate SetUp algorithms / above interactive 1W-AKE protocol / AKE protocol / provably secure 1W-AKE protocol / /

SocialTag