Cryptology ePrint Archive: Report 2014/787

Another Tor is possible

Amadou Moctar Kane

Abstract: The aim of this paper is to introduce some modifications in Tor, in order to improve userís anonymity and relayís security. Thus, we introduced a system that will ensure anonymity for all users, while maintaining the ability to break the anonymity of a sender in case of misconduct. The revocation of the anonymity will require the use of secret sharing schemes, since we assume that, the lifting of the anonymity of the dishonest user should not depend on a single entity, but on a consensus within the network. In addition to the revocation of the anonymity, we propose in this paper further improvements such as mixing Tor traffic with those of the major internet groups, using the camouflage, or introducing a honeypot in the network.

Category / Keywords: applications / Tor, cryptography, privacy, anonymity, secret sharing.

Date: received 3 Oct 2014

Contact author: amadou1 at gmail com

Available format(s): PDF | BibTeX Citation

Version: 20141007:015034 (All versions of this report)

Short URL: ia.cr/2014/787

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]