A Formal Treatment of Onion Routing
From MaRDI portal
Publication:5451025
DOI10.1007/11535218_11zbMath1145.94460OpenAlexW2143215034MaRDI QIDQ5451025
Jan Camenisch, Anna Lysyanskaya
Publication date: 17 March 2008
Published in: Advances in Cryptology – CRYPTO 2005 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11535218_11
Related Items (14)
Revisiting key-alternating Feistel ciphers for shorter keys and multi-user security ⋮ A theory of composition for differential obliviousness ⋮ Identity-based encryption for fair anonymity applications: defining, implementing, and applying rerandomizable RCCA-secure IBE ⋮ Onion routing with replies ⋮ Unnamed Item ⋮ Poly onions: achieving anonymity in the presence of churn ⋮ Cryptographic shallots: a formal treatment of repliable onion encryption ⋮ A universally composable framework for the privacy of email ecosystems ⋮ An analysis of trust in anonymity networks in the presence of adaptive attackers ⋮ Provable unlinkability against traffic analysis with low message overhead ⋮ Conditional Probabilities over Probabilistic and Nondeterministic Systems ⋮ Non-interactive anonymous router ⋮ Generic Constant-Round Oblivious Sorting Algorithm for MPC ⋮ Spreading the privacy blanket: differentially oblivious shuffling for differential privacy
This page was built for publication: A Formal Treatment of Onion Routing