2016
DOI: 10.1109/tetc.2015.2400131
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Anonymous Communication Technique: Formal Model and Its Prototype Implementation

Abstract: Both anonymity and end-to-end encryption are recognized as important properties in privacy-preserving communication. However, secure and anonymous communication protocol that requires both anonymity and end-to-end encryption cannot be realized through a simple combination of current anonymous communication protocols and public key infrastructure (PKI). Indeed, the current PKI contradicts anonymity because the certificate for a user's public key identifies the user. Moreover, we believe that anonymous communica… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
20
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 23 publications
(21 citation statements)
references
References 36 publications
0
20
0
Order By: Relevance
“…A formal method for secure and anonymous communication and its prototype implementation is introduced by Keita et al [1]. In this some proxy entities are used which can mask the IP address from the service providers.…”
Section: Literature Surveymentioning
confidence: 99%
“…A formal method for secure and anonymous communication and its prototype implementation is introduced by Keita et al [1]. In this some proxy entities are used which can mask the IP address from the service providers.…”
Section: Literature Surveymentioning
confidence: 99%
“…In this paper, we point out that no IBE is required for constructing a secure and anonymous communication protocol, and we construct a more efficient protocol that archives the same security level as the IBE-based protocol [1], [2] does. By modifying the protocol syntax properly, we can apply the KEM/DEM framework [5] 1 for establishing a secure channel instead of IBE; a session key is encapsulated by the KEM part, and the actual data is encrypted by the DEM part.…”
Section: B Our Contributionmentioning
confidence: 99%
“…That is, although the user additionally needs to compute a ciphertext by using the SP public key (which can be certified by PKI) for establishing a secure channel, no pairing computation is required for decryption or encryption by the user or the SP, respectively. As a remark, we can interpret that the IBE-based construction [1], [2] delegates such an encryption cost from the user to the SP.…”
Section: B Our Contributionmentioning
confidence: 99%
See 2 more Smart Citations