Anonymous Communication with On-line and Off-line Onion Encoding. Gomulkiewicz, M., Klonowski, M., & Kutylowski, M. August 2004. abstract bibtex Encapsulating messages in onions is one of the major techniques providing anonymous communication in computer networks. To some extent, it provides security against traffic analysis by a passive adversary. However, it can be highly vulnerable to attacks by an active adversary. For instance, the adversary may perform a simple so\textendashcalled repetitive attack: a malicious server sends the same massage twice, then the adversary traces places where the same message appears twice \textendash revealing the route of the original message. A repetitive attack was examined for mix\textendashnetworks. However, none of the countermeasures designed is suitable for onion\textendashrouting. In this paper we propose an \textquotedblleftonion-like\textquotedblright encoding design based on universal reencryption. The onions constructed in this way can be used in a protocol that achieves the same goals as the classical onions, however, at the same time we achieve immunity against a repetitive attack. Even if an adversary disturbs communication and prevents processing a message somewhere on the onion path, it is easy to identify the malicious server performing the attack and provide an evidence of its illegal behavior.
@conference {wisa04-Klonowski,
title = {Anonymous Communication with On-line and Off-line Onion Encoding},
booktitle = {Proceedings of Workshop on Information Security Applications (WISA 2004)},
year = {2004},
month = {August},
publisher = {Springer Berlin / Heidelberg},
organization = {Springer Berlin / Heidelberg},
abstract = {Encapsulating messages in onions is one of the major techniques providing anonymous communication in computer networks. To some extent, it provides security against traffic analysis by a passive adversary. However, it can be highly vulnerable to attacks by an active adversary. For instance, the adversary may perform a simple so{\textendash}called repetitive attack: a malicious server sends the same massage twice, then the adversary traces places where the same message appears twice {\textendash} revealing the route of the original message. A repetitive attack was examined for mix{\textendash}networks. However, none of the countermeasures designed is suitable for onion{\textendash}routing.
In this paper we propose an {\textquotedblleft}onion-like{\textquotedblright} encoding design based on universal reencryption. The onions constructed in this way can be used in a protocol that achieves the same goals as the classical onions, however, at the same time we achieve immunity against a repetitive attack. Even if an adversary disturbs communication and prevents processing a message somewhere on the onion path, it is easy to identify the malicious server performing the attack and provide an evidence of its illegal behavior.},
keywords = {onion routing, repetitive attack, universal re-encryption, unlinkability},
isbn = {978-3-540-24302-1},
author = {Marcin Gomulkiewicz and Marek Klonowski and Miroslaw Kutylowski}
}
Downloads: 0
{"_id":"kFdEhXXRfbxaHqmgk","bibbaseid":"gomulkiewicz-klonowski-kutylowski-anonymouscommunicationwithonlineandofflineonionencoding-2004","downloads":0,"creationDate":"2018-07-03T04:50:28.858Z","title":"Anonymous Communication with On-line and Off-line Onion Encoding","author_short":["Gomulkiewicz, M.","Klonowski, M.","Kutylowski, M."],"year":2004,"bibtype":"conference","biburl":"https://gnunet.org/bibliography/export/bibtex","bibdata":{"bibtype":"conference","type":"conference","title":"Anonymous Communication with On-line and Off-line Onion Encoding","booktitle":"Proceedings of Workshop on Information Security Applications (WISA 2004)","year":"2004","month":"August","publisher":"Springer Berlin / Heidelberg","organization":"Springer Berlin / Heidelberg","abstract":"Encapsulating messages in onions is one of the major techniques providing anonymous communication in computer networks. To some extent, it provides security against traffic analysis by a passive adversary. However, it can be highly vulnerable to attacks by an active adversary. For instance, the adversary may perform a simple so\\textendashcalled repetitive attack: a malicious server sends the same massage twice, then the adversary traces places where the same message appears twice \\textendash revealing the route of the original message. A repetitive attack was examined for mix\\textendashnetworks. However, none of the countermeasures designed is suitable for onion\\textendashrouting. In this paper we propose an \\textquotedblleftonion-like\\textquotedblright encoding design based on universal reencryption. The onions constructed in this way can be used in a protocol that achieves the same goals as the classical onions, however, at the same time we achieve immunity against a repetitive attack. Even if an adversary disturbs communication and prevents processing a message somewhere on the onion path, it is easy to identify the malicious server performing the attack and provide an evidence of its illegal behavior.","keywords":"onion routing, repetitive attack, universal re-encryption, unlinkability","isbn":"978-3-540-24302-1","author":[{"firstnames":["Marcin"],"propositions":[],"lastnames":["Gomulkiewicz"],"suffixes":[]},{"firstnames":["Marek"],"propositions":[],"lastnames":["Klonowski"],"suffixes":[]},{"firstnames":["Miroslaw"],"propositions":[],"lastnames":["Kutylowski"],"suffixes":[]}],"bibtex":"@conference {wisa04-Klonowski,\n\ttitle = {Anonymous Communication with On-line and Off-line Onion Encoding},\n\tbooktitle = {Proceedings of Workshop on Information Security Applications (WISA 2004)},\n\tyear = {2004},\n\tmonth = {August},\n\tpublisher = {Springer Berlin / Heidelberg},\n\torganization = {Springer Berlin / Heidelberg},\n\tabstract = {Encapsulating messages in onions is one of the major techniques providing anonymous communication in computer networks. To some extent, it provides security against traffic analysis by a passive adversary. However, it can be highly vulnerable to attacks by an active adversary. For instance, the adversary may perform a simple so{\\textendash}called repetitive attack: a malicious server sends the same massage twice, then the adversary traces places where the same message appears twice {\\textendash} revealing the route of the original message. A repetitive attack was examined for mix{\\textendash}networks. However, none of the countermeasures designed is suitable for onion{\\textendash}routing.\r\nIn this paper we propose an {\\textquotedblleft}onion-like{\\textquotedblright} encoding design based on universal reencryption. The onions constructed in this way can be used in a protocol that achieves the same goals as the classical onions, however, at the same time we achieve immunity against a repetitive attack. Even if an adversary disturbs communication and prevents processing a message somewhere on the onion path, it is easy to identify the malicious server performing the attack and provide an evidence of its illegal behavior.},\n\tkeywords = {onion routing, repetitive attack, universal re-encryption, unlinkability},\n\tisbn = {978-3-540-24302-1},\n\tauthor = {Marcin Gomulkiewicz and Marek Klonowski and Miroslaw Kutylowski}\n}\n","author_short":["Gomulkiewicz, M.","Klonowski, M.","Kutylowski, M."],"key":"wisa04-Klonowski","id":"wisa04-Klonowski","bibbaseid":"gomulkiewicz-klonowski-kutylowski-anonymouscommunicationwithonlineandofflineonionencoding-2004","role":"author","urls":{},"keyword":["onion routing","repetitive attack","universal re-encryption","unlinkability"],"downloads":0},"search_terms":["anonymous","communication","line","line","onion","encoding","gomulkiewicz","klonowski","kutylowski"],"keywords":["onion routing","repetitive attack","universal re-encryption","unlinkability"],"authorIDs":[],"dataSources":["FWsPTwsmjtrBtRS3B"]}