Cryptology ePrint Archive: Report 2014/787
Another Tor is possible
Amadou Moctar Kane
Abstract: The aim of this paper is to introduce some modifications in Tor, in order to improve user’s anonymity and relay’s security. Thus, we introduced a system that will ensure anonymity for all users, while
maintaining the ability to break the anonymity of a sender in case of misconduct. The revocation of the anonymity will require the use of secret sharing schemes, since we assume that, the lifting of the
anonymity of the dishonest user should not depend on a single entity, but on a consensus within the network. In addition to the revocation of the anonymity, we propose in this paper further improvements
such as mixing Tor traffic with those of the major internet groups, using the camouflage, or introducing a honeypot in the network.
Category / Keywords: applications / Tor, cryptography, privacy, anonymity, secret sharing.
Date: received 3 Oct 2014
Contact author: amadou1 at gmail com
Available format(s): PDF | BibTeX Citation
Version: 20141007:015034 (All versions of this report)
Short URL: ia.cr/2014/787
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]