Anonymous communication with elementary cyclic routes (Japanese)

In: Transactions of the Information Processing Society of Japan   ;  41 ,  8  ;  2148-2160  ;  2000
  • ISSN:
  • Article (Journal)  /  Print

How to get this document?

In today's computer networks, it is important to provide anonymity to protect a users' privacy. However, previous anonymous communication protocols had disadvantages in that repeated encryption may be required, or that receiver anonymity is not realized. Therefore, we propose a new anonymous communication scheme with cyclic routes. Cyclic routes have the advantage that neither starting points nor end points exist. This feature would be useful for realizing anonymous communication where identities of senders (starting points) and receivers (end points) must be made unknown. Thus our scheme reduces the cost of key distribution, encryption, and decryption, maintaining anonymity of both senders and receivers. We formally define our protocol and discuss its various aspects including anonymity. We especially show that our scheme can generally provide a higher degree of anonymity than the Crowds system proposed recently.

Table of contents – Volume 41, Issue 8

Show all volumes and issues

The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.

Generating shared RSA parameters for two communicating parties
Barmawi, A.M. / Takada, S. / Doi, N. | 2000
Efficient construction of elliptic curves over optimal extension-field
Futa, Y. / Miyaji, A. | 2000
The secure renewal of cryptosystems in the open network architecture
Yamada, T. / Miyaji, A. / Soshi, M. | 2000
Anonymous communication with elementary cyclic routes
Kitazawa, S. / Nagano, S. / Soshi, M. / Miyaji, A. | 2000
Applying legitimate access database for MLSI-based intrusion detection
Harada, S. / Asaka, M. | 2000
Security analysis on the proactivized system against latent virus attacks
Watanabe, Y. / Imai, H. | 2000
Software-based music delivery platform
Uda, R. / Sunada, A. / Inoue, A. / Shigeno, H. / Matsushita, Y. | 2000
An optimal decision method for establishment of security objectives
Nagai, Y. / Fujiyama, T. / Sasaki, R. | 2000
A macro system with class objects for the Java language
Tatsubori, M. / Chiba, S. / Itano, K. | 2000