首页    期刊浏览 2024年09月13日 星期五
登录注册

文章基本信息

  • 标题:Secure and Anonymous Communication Technique: Formal Model and Its Prototype Implementation
  • 作者:Keita Emura ; Akira Kanaoka ; Satoshi Ohta
  • 期刊名称:IEEE Transactions on Emerging Topics in Computing
  • 印刷版ISSN:2168-6750
  • 出版年度:2016
  • 卷号:4
  • 期号:1
  • 页码:88-101
  • DOI:10.1109/TETC.2015.2400131
  • 语种:English
  • 出版社:IEEE Publishing
  • 摘要:

    Both anonymity and end-to-end encryption are recognized as important properties in privacy-preserving communication. However, secure and anonymous communication protocol that requires both anonymity and end-to-end encryption cannot be realized through a simple combination of current anonymous communication protocols and public key infrastructure (PKI). Indeed, the current PKI contradicts anonymity because the certificate for a user's public key identifies the user. Moreover, we believe that anonymous communication channels should have certain authentication mechanisms because such a channel could incubate criminal communication. To cope with this issue, we propose a secure and anonymous communication protocol by employing identity-based encryption for encrypting packets without sacrificing anonymity, and group signature for anonymous user authentication. Communication occurs in the protocol through proxy entities that conceal user IP addresses from service providers (SPs). We also introduce a proof-of-concept implementation to demonstrate the protocol's feasibility and analyze its performance. Finally, we conclude that the protocol realizes secure and anonymous communications between users and SPs with practical performance.

  • 关键词:authorisation; cryptographic protocols; data privacy; digital signatures; message authentication; PKI; anonymity; anonymous communication channels; anonymous communication protocol; anonymous communication technique; anonymous user authentication; authentication mechanisms; criminal communication; end-to-end encryption; formal model; group signature; identity-based encryption; packets encryption; privacy-preserving communication; proxy entities; public key infrastructure; secure communication protocol; secure communication technique; service providers; user IP addresses; Authentication; IP networks; Protocols; Public key; Servers; Anonymous Authentication; Anonymous Communication; Anonymous communication; Group Signature; Identity-Based Encryption; Secure Channel; anonymous authentication; group signature; identity-based encryption; secure channel
Loading...
联系我们|关于我们|网站声明
国家哲学社会科学文献中心版权所有