Back to Results
First PageMeta Content
Diffie–Hellman key exchange / Learning with errors / XTR / Onion routing / Homomorphic encryption / Transport Layer Security / RSA / Cryptography / Cryptographic protocols / Electronic commerce


Post-Quantum Secure Onion Routing (Future Anonymity in Today’s Budget) Satrajit Ghosh† † Aniket Kate‡
Add to Reading List

Document Date: 2015-04-09 11:34:21


Open Document

File Size: 858,13 KB

Share Result on Facebook

City

Kolkata / /

Company

eB sA / 2eB sA / pB sA / /

Country

India / /

Currency

pence / /

Event

FDA Phase / /

Facility

Indian Statistical Institute / Saarland University / /

IndustryTerm

authentication protocol / Internet-based destina tions / agreement protocols / efficient solution / search version / public key infrastructure / shared se tographic applications / public-key infrastructure / employed ntor protocol / agreement protocol / real-world cryptographic protocols / cryptographic infrastructure / lattice-based onion routing protocol / real-world applications / reduction algorithm / secure protocol / real life systems / lattice-based key exchange protocols / reduction algorithms / reduc tion algorithm / ntor protocol / anonymous web browsing / computing / communication networks / overlay network / /

Organization

Saarland University / U.S. Securities and Exchange Commission / Indian Statistical Institute / /

Person

Bob / Alice / Tor Learning / /

Position

randomness extractor / extractor / Prime Minister / random ness extractor / forward / /

Product

H1 / R2 / sec / section / H2 / /

ProgrammingLanguage

R / /

Technology

reduction algorithms / second generation Tor protocol / public key infrastructure / 1W-AKE protocols / 1W-AKE protocol / random In ntor protocol / reduc tion algorithm / randomized algorithm / HybridOR protocol / above AKE protocol / lattice-based 1W-AKE protocol / ntor protocol / key exchange protocol / hybrid 1W-AKE protocol / PKI / key agreement protocol / SetUp algorithm / 2 algorithm / lattice-based key exchange protocols / known 1W-AKE protocols / CPA-secure RSA encryption / private key / secret key / PPT algorithms / provably secure session key A. agreement protocols / Tor protocol / SSL / reduction algorithm / 1W-AKE algorithm / public-key infrastructure / currently employed ntor protocol / Init algorithm / encryption / cryptography / secure 1W-AKE protocol / Tor authentication protocol / public key / TLS protocol / key-encapsulation protocol / secure AKE protocol / G. On success The SetUp algorithm / OR protocol / existing Tor protocol / 1W-AKE secure protocol / TAP protocol / two key exchange protocols / PPT reduction algorithm / two separate SetUp algorithms / dom / lattice-based protocol / lattice-based onion routing protocol / 1W AKE protocol / public key X. protocol / provably secure 1W-AKE protocol / AKE protocol / /

SocialTag