<--- Back to Details
First PageDocument Content
Cryptographic software / Boneh/Franklin scheme / Finite fields / Tor / Onion routing / XTR / Diffie–Hellman key exchange / Public-key cryptography / Pairing / Cryptography / Internet privacy / Cryptographic protocols
Date: 2010-12-30 09:39:44
Cryptographic software
Boneh/Franklin scheme
Finite fields
Tor
Onion routing
XTR
Diffie–Hellman key exchange
Public-key cryptography
Pairing
Cryptography
Internet privacy
Cryptographic protocols

Pairing-Based Onion Routing with Improved Forward Secrecy ANIKET KATE, GREG M. ZAVERUCHA, and IAN GOLDBERG University of Waterloo This article presents new protocols for onion routing anonymity networks. We define a pro

Add to Reading List

Source URL: www.cypherpunks.ca

Download Document from Source Website

File Size: 358,78 KB

Share Document on Facebook

Similar Documents

guard sets for onion routing Jamie Hayes - joint work with George Danezis University College London

guard sets for onion routing Jamie Hayes - joint work with George Danezis University College London

DocID: 1xTjd - View Document

Intro to Onion Routing Sphinx: A Compact and Provably Secure Mix Format HORNET: High-speed Onion Routing at the Network Layer Forward Secrecy Security Assumptions Future Directions

Intro to Onion Routing Sphinx: A Compact and Provably Secure Mix Format HORNET: High-speed Onion Routing at the Network Layer Forward Secrecy Security Assumptions Future Directions

DocID: 1uRkl - View Document

Anonymous Connections and Onion Routing Paul F. Syverson, David M. Goldschlag, and Michael G. Reed   Naval Research Laboratory

Anonymous Connections and Onion Routing Paul F. Syverson, David M. Goldschlag, and Michael G. Reed  Naval Research Laboratory

DocID: 1tcyz - View Document

Using Sphinx to Improve Onion Routing Circuit Construction∗ Aniket Kate and Ian Goldberg David R. Cheriton School of Computer Science University of Waterloo, ON, Canada {akate,iang}@cs.uwaterloo.ca Abstract

Using Sphinx to Improve Onion Routing Circuit Construction∗ Aniket Kate and Ian Goldberg David R. Cheriton School of Computer Science University of Waterloo, ON, Canada {akate,iang}@cs.uwaterloo.ca Abstract

DocID: 1t5IF - View Document