Font Size: a A A

The Study Of Anonymous Technology In Verifiable MIX

Posted on:2017-10-10Degree:MasterType:Thesis
Country:ChinaCandidate:J X LinFull Text:PDF
GTID:2348330518995639Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of the Internet wave of the information age and the advent of science and technology,more and more people began to focus on anonymous communication systems in order to ensure that the information in the transmission process safety.New Directions in Cryptography Research also anonymous communication system to inject fresh vitality,Tor,I2P,DC-net and MIX and other anonymous communication technology came into being.MIX network is composed of multiple servers.Each MIX service is a message can be stored,re-encryption/decryption,random permutation,forwarding a series of computer operations.After these operations,so that the external observer can not obtain the correspondence between its input and output,better ensure the user's privacy.Verifiability MIX network can be classified the sender verifiability,public verifiability,conditional public verifiability.onditional public verifiability has verifiable efficiency,the advantages of low computational complexity,which makes it a hot spot now anonymous communication research.Tor is a low-latency MIX program,we propose a verifiable against Tor(Verifiabable)program V-Tor.Compare the original Tor program,the new program in the process of establishing a communications link,an additional communication link is established for verification.Introducing the concept of the program is usually voting scheme in the bulletin board,the two links are verified evidence entered into the bulletin board to provide any verifiable service certifier.Our condition for publicly verifiable limitations associated Scytl presented the program for the attack two variants attack.Correctness break the user's first attack with a certain probability of privacy or message.The second attack so publicly verifiable conditions become invalid.In this paper,for the shortage of Scytl,SP-Scytl programs we propose can effectively compensate for the original program codes to generate a security flaw with the sender verifiable,and which can resist the client caused the first attack.Meanwhile,the new scheme is introduced the idea of everlasting privacy,divided into two parts ciphertext message,thus a single server can not tamper with a complete ballot,successfully weathered the two relation attacks.
Keywords/Search Tags:MIX-net, Verifiability, Relation Attacks, Cryptography
PDF Full Text Request
Related items