Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
Consistent, yet anonymous, Web access with LPWA
Communications of the ACM
Anonymizing Censorship Resistant Systems
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
How to Make Personalized Web Browising Simple, Secure, and Anonymous
FC '97 Proceedings of the First International Conference on Financial Cryptography
P5: A Protocol for Scalable Anonymous Communication
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
Responder Anonymity and Anonymous Peer-to-Peer File Sharing
ICNP '01 Proceedings of the Ninth International Conference on Network Protocols
Anonymous Connections and Onion Routing
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Efficient 1-Out-of-n Oblivious Transfer Schemes with Universally Usable Parameters
IEEE Transactions on Computers
Publius: a robust, tamper-evident, censorship-resistant web publishing system
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Low-cost and reliable mutual anonymity protocols in peer-to-peer networks
IEEE Transactions on Parallel and Distributed Systems
Hi-index | 0.00 |
In this paper, we present two types of protocols that can achieve mutual anonymity in peer-to-peer (P2P) network environments, which means the identities of the service, requesters and providers, are anonymous to each other, to other peers, and even to the trusted third party (TTP). One of the two types of protocols is for hybrid P2P systems where there is a TTP to construct the transmission paths and look up the query files. The other type of protocol is for pure P2P environments where no TTP is involved in the session network. These two new protocols are based on primitive roots for three main reasons: simplicity, flexibility, and efficiency. Other issues concerning the P2P network structure as well as the security analyses of the proposed protocols will also be covered in this paper.