Secure anonymous communications with practical anonymity revocation scheme

  • Authors:
  • Koji Chida;Osamu Shionoiri;Atsushi Kanai

  • Affiliations:
  • NTT Corporation, Tokyo, Japan;NTT West Corporation and NTT Corporation, Tokyo, Japan;NTT Corporation, Tokyo, Japan

  • Venue:
  • IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

We propose an anonymous communication scheme using a multistage cryptographic anonymous proxy to make malicious users traceable. For the purpose of preventing illegal use of an anonymous channel, the proposed scheme can identify an illegal anonymous user or his accomplice who joins a conspiracy if a threshold number of third parties or more agrees on anonymity revocation. Expected applications of the proposed scheme include real-time web services over the Internet in which both user anonymity and preventing illegal use are desired such as anonymous bulletin board services, auctions, and peer-to-peer file exchange. Moreover, we implemented the proposed scheme to verify the degree of practicality. The implementation results include that the case for the received data of 100 KB from an HTTP request and a ten-stage relay for the anonymous proxy on an Intel Pentium 4 3.0 GHz PC took approximately 1 sec to receive, and the received data of 1 MB and a two-stage relay required 2 sec.