Back to Results
First PageMeta Content
Cryptographic software / Boneh/Franklin scheme / Finite fields / Tor / Onion routing / XTR / Diffie–Hellman key exchange / Public-key cryptography / Pairing / Cryptography / Internet privacy / Cryptographic protocols


Pairing-Based Onion Routing with Improved Forward Secrecy ANIKET KATE, GREG M. ZAVERUCHA, and IAN GOLDBERG University of Waterloo This article presents new protocols for onion routing anonymity networks. We define a pro
Add to Reading List

Document Date: 2010-12-30 09:39:44


Open Document

File Size: 358,78 KB

Share Result on Facebook

City

Pairing / New York / /

Company

Computer-Communication Networks / K AB / Dupont / ACM Inc. / USER ANONYMITY / /

Country

Canada / United States / /

Currency

USD / /

/

Event

FDA Phase / /

Facility

Penn Plaza / University of Waterloo / University Ave. West / IAN GOLDBERG University / /

/

IndustryTerm

network communications / secure symmetric-key-based mutual authentication protocol / circuit construction protocols / noninteractive protocols / anonymity networks / onion routing anonymity networks / noninteractive key exchange protocol / intermediate onion routers / correct solution / latency communication networks / agreement protocol / identity-based infrastructure / fewer network communications / directory server / cryptographic protocols / anonymous authentication protocol / cryptographic applications / cyclic / symmetric-key-based challengeresponse protocol / mobile ad hoc networks / onion routers / anonymous key agreement protocol / /

Organization

IAN GOLDBERG University / University of Waterloo / David R. Cheriton School of Computer Science / Natural Sciences and Engineering Research Council of Canada / /

Person

GREG M. ZAVERUCHA / Forward Secrecy / I. Goldberg / Key Generator / G. M. Zaverucha / /

/

Position

hB / General / /

Product

Franklin / Sakai / A1 / A2 / Section / /

ProvinceOrState

New York / /

Technology

noninteractive key exchange protocol / 1000 onion routers / Information Technology / key agreement protocol / onion routers / circuit construction protocols / Data Encryption / private key / symmetric-key-based challengeresponse protocol / encryption / G. An algorithm / cryptography / proposed protocols / pairing-based cryptographic protocols / Public key / noninteractive protocols / intermediate onion routers / secure symmetric-key-based mutual authentication protocol / cryptographic protocols / anonymous authentication protocol / anonymous key agreement protocol / aforesaid H-query algorithm / /

URL

http /

SocialTag