Efficient and secure identity-based onion routing

Junbeom Hur, Dong Kun Noh

Research output: Contribution to journalArticlepeer-review

2 Citations (Scopus)

Abstract

Onion routing protocols achieve low-latency anonymous communication on public networks. To date, many onion routing protocols have been proposed, such as Tor network, in order to implement the anony mous network connection in the public networks. Although the previous schemes' multi-pass crypto graphic circuit construction appears satisfactory, their circuit construction protocols have some drawbacks with regard to the efficiency and security. This paper presents a novel identity-based onion routing protocol that allows users to establish anonymous channels over a public network. The proposed scheme eliminates iterative and interactive symmetric key agreement procedures between users and onion routers by embedding a circuit construction into the non-interactive message delivery process. It significantly improves the storage and communication costs required from each user and onion router compared to the previous onion routing protocols, while requiring comparable computation cost to them.

Original languageEnglish
Pages (from-to)93-105
Number of pages13
JournalJournal of Research and Practice in Information Technology
Volume46
Issue number2-3
Publication statusPublished - 2014 Aug
Externally publishedYes

Bibliographical note

Funding Information:
This work was supported by the Chung-Ang University Research Grants in 2011, and the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (2012R1A1A1001835).

Publisher Copyright:
Copyright © 2014, Australian Computer Society Inc.

Keywords

  • Anonymity
  • Circuit construction
  • Complexity analysis
  • Encryption
  • Onion-routing

ASJC Scopus subject areas

  • Software
  • Management Information Systems
  • Information Systems
  • Hardware and Architecture
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Efficient and secure identity-based onion routing'. Together they form a unique fingerprint.

Cite this