Key management for onion routing in a true peer to peer setting

dc.contributor.authorPalmieri, Paolo
dc.contributor.authorPouwelse, Johan A.
dc.date.accessioned2017-09-21T15:06:05Z
dc.date.available2017-09-21T15:06:05Z
dc.date.issued2014-08
dc.date.updated2017-09-20T15:33:48Z
dc.description.abstractOnion routing is a technique for anonymous and privacy preserving communication at the base of popular Internet anonymity tools such as Tor. In onion routing, traffic is relayed by a number of intermediary nodes (called relays) before it reaches the intended destination. To guarantee privacy and prevent tampering, each packet is encrypted multiple times in a layered manner, using the public keys of the relays. Therefore, this mechanism makes two important assumptions: first, that the relays are able to communicate with each other; second, that the user knows the list of available relays and their respective public keys. Tor implements therefore a distributed directory listing the relays and their keys. When a user is not able to communicate with relays directly, he has to use special bridge servers to connect to the onion network. This construction, however, does not work in a fully peer to peer setting, where each peer only knows a limited number of other peers and may not be able to communicate with some of them due, for instance, to NAT or firewalls. In this paper we propose a key management scheme for onion routing that overcomes these problems. The proposed solution does not need a directory system and does not imply knowledge of all active relays, while it guarantees the secure distribution of public keys. We also present an alternative strategy for building circuit of relays based on bloom filters. The proposed construction overcomes some of the structural inefficiencies of the Tor design, and opens the way for implementing onion routing over a true peer to peer overlay network.en
dc.description.statusPeer revieweden
dc.description.versionAccepted Versionen
dc.format.mimetypeapplication/pdfen
dc.identifier.citationPalmieri, P. and Pouwelse, J. (2014) 'Key Management for Onion Routing in a True Peer to Peer Setting', in Yoshida, M. & Mouri, K. (eds.) Advances in Information and Computer Security: 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings. Cham: Springer International Publishing, pp. 62-71. doi: 10.1007/978-3-319-09843-2_5en
dc.identifier.doi10.1007/978-3-319-09843-2_5
dc.identifier.endpage71en
dc.identifier.isbn978-3-319-09843-2
dc.identifier.journaltitleAdvances in Information and Computer Security: 9th International Workshop on Security, IWSEC 2014en
dc.identifier.startpage62en
dc.identifier.urihttps://hdl.handle.net/10468/4764
dc.language.isoenen
dc.publisherSpringer International Publishingen
dc.relation.ispartofAdvances in Information and Computer Security - 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings
dc.relation.urihttps://link.springer.com/chapter/10.1007/978-3-319-09843-2_5
dc.rights© Springer International Publishing Switzerland 2014. The final publication is available at Springer via http://doi.org/10.1007/978-3-319-09843-2_5en
dc.subjectKey managamenten
dc.subjectOnion routingen
dc.subjectPeer to peeren
dc.titleKey management for onion routing in a true peer to peer settingen
dc.typeConference itemen
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Palmieri_Pouwelse_IWSEC2014.pdf
Size:
201.75 KB
Format:
Adobe Portable Document Format
Description:
Accepted version
License bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
2.71 KB
Format:
Item-specific license agreed upon to submission
Description: