Sciweavers

Share
CCS
2007
ACM

A k-anonymous communication protocol for overlay networks

9 years 10 months ago
A k-anonymous communication protocol for overlay networks
Anonymity is increasingly important for network applications concerning about censorship and privacy. The existing anonymous communication protocols generally stem from mixnet and DC-net. They either cannot provide provable anonymity or suffer from transmission collision. In this paper, we introduce a novel approach which takes advantage of hierarchical ring structure and mix technique. This proposed protocol is collision free and provides provable kanonymity for both the sender and the recipient, even if a polynomial time adversary can eavesdrop all network traffic and control a fraction of participants. Furthermore, it can hide the sender and the recipient from each other and thus can be used for anonymous file sharing. The analysis shows the proposed protocol is secure against various attacks. Measurements further demonstrate it is practical. Categories and Subject Descriptors C.2.0 [Computer-Communication Networks]: General— Security and protection; C.2.1 [Computer-Communicat...
Pan Wang, Peng Ning, Douglas S. Reeves
Added 07 Jun 2010
Updated 07 Jun 2010
Type Conference
Year 2007
Where CCS
Authors Pan Wang, Peng Ning, Douglas S. Reeves
Comments (0)
books