Anonymous communication with elementary cyclic routes (Japanese)

In: Transactions of the Information Processing Society of Japan   ;  41 ,  8  ;  2148-2160  ;  2000
  • ISSN:
  • Article (Journal)  /  Print

How to get this document?

In today's computer networks, it is important to provide anonymity to protect a users' privacy. However, previous anonymous communication protocols had disadvantages in that repeated encryption may be required, or that receiver anonymity is not realized. Therefore, we propose a new anonymous communication scheme with cyclic routes. Cyclic routes have the advantage that neither starting points nor end points exist. This feature would be useful for realizing anonymous communication where identities of senders (starting points) and receivers (end points) must be made unknown. Thus our scheme reduces the cost of key distribution, encryption, and decryption, maintaining anonymity of both senders and receivers. We formally define our protocol and discuss its various aspects including anonymity. We especially show that our scheme can generally provide a higher degree of anonymity than the Crowds system proposed recently.

Table of contents – Volume 41, Issue 8

Show all volumes and issues

The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.

2068
Generating shared RSA parameters for two communicating parties
Barmawi, A.M. / Takada, S. / Doi, N. | 2000
2092
Efficient construction of elliptic curves over optimal extension-field
Futa, Y. / Miyaji, A. | 2000
2102
The secure renewal of cryptosystems in the open network architecture
Yamada, T. / Miyaji, A. / Soshi, M. | 2000
2148
Anonymous communication with elementary cyclic routes
Kitazawa, S. / Nagano, S. / Soshi, M. / Miyaji, A. | 2000
2208
Applying legitimate access database for MLSI-based intrusion detection
Harada, S. / Asaka, M. | 2000
2228
Security analysis on the proactivized system against latent virus attacks
Watanabe, Y. / Imai, H. | 2000
2237
Software-based music delivery platform
Uda, R. / Sunada, A. / Inoue, A. / Shigeno, H. / Matsushita, Y. | 2000
2264
An optimal decision method for establishment of security objectives
Nagai, Y. / Fujiyama, T. / Sasaki, R. | 2000
2327
A macro system with class objects for the Java language
Tatsubori, M. / Chiba, S. / Itano, K. | 2000
Feedback