{"title":"一种新的可证明安全匿名通信(PSAC)方案","authors":"Jian Ren, L. Harn, Tongtong Li","doi":"10.1109/WASA.2007.137","DOIUrl":null,"url":null,"abstract":"Anonymity is increasingly important for network communications concerning about censorship and privacy. Early research on source anonymous communication protocols generally stems from mixnet and DC-net. They either cannot provide provable anonymity or suffer from transmission collision. To solve this problem, a k-anonymous protocol based on hierarchical ring structure and mix technique was proposed. This proposed protocol is collision free and provides provable k-anonymity for both the sender and the recipient. However, this protocol requires the trustworthiness of k honest nodes, therefore, anonymity is only conditional. Alternatively, in this paper, we propose a provably secure anonymous communication (PSAC) scheme without relying on any trusted third parties. While ensuring the message sender anonymity, it can also provide message content authenticity. The proposed PSAC scheme can prevent tracing the senders of messages and limits the disruption that can be caused by participants.","PeriodicalId":316831,"journal":{"name":"International Conference on Wireless Algorithms, Systems and Applications (WASA 2007)","volume":"208 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"A Novel Provably Secure Anonymous Communication (PSAC) Scheme\",\"authors\":\"Jian Ren, L. Harn, Tongtong Li\",\"doi\":\"10.1109/WASA.2007.137\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Anonymity is increasingly important for network communications concerning about censorship and privacy. Early research on source anonymous communication protocols generally stems from mixnet and DC-net. They either cannot provide provable anonymity or suffer from transmission collision. To solve this problem, a k-anonymous protocol based on hierarchical ring structure and mix technique was proposed. This proposed protocol is collision free and provides provable k-anonymity for both the sender and the recipient. However, this protocol requires the trustworthiness of k honest nodes, therefore, anonymity is only conditional. Alternatively, in this paper, we propose a provably secure anonymous communication (PSAC) scheme without relying on any trusted third parties. While ensuring the message sender anonymity, it can also provide message content authenticity. The proposed PSAC scheme can prevent tracing the senders of messages and limits the disruption that can be caused by participants.\",\"PeriodicalId\":316831,\"journal\":{\"name\":\"International Conference on Wireless Algorithms, Systems and Applications (WASA 2007)\",\"volume\":\"208 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Conference on Wireless Algorithms, Systems and Applications (WASA 2007)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WASA.2007.137\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Wireless Algorithms, Systems and Applications (WASA 2007)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WASA.2007.137","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Novel Provably Secure Anonymous Communication (PSAC) Scheme
Anonymity is increasingly important for network communications concerning about censorship and privacy. Early research on source anonymous communication protocols generally stems from mixnet and DC-net. They either cannot provide provable anonymity or suffer from transmission collision. To solve this problem, a k-anonymous protocol based on hierarchical ring structure and mix technique was proposed. This proposed protocol is collision free and provides provable k-anonymity for both the sender and the recipient. However, this protocol requires the trustworthiness of k honest nodes, therefore, anonymity is only conditional. Alternatively, in this paper, we propose a provably secure anonymous communication (PSAC) scheme without relying on any trusted third parties. While ensuring the message sender anonymity, it can also provide message content authenticity. The proposed PSAC scheme can prevent tracing the senders of messages and limits the disruption that can be caused by participants.