Cryptology ePrint Archive: Report 2015/215

A revocable anonymity in Tor

Amadou Moctar Kane

Abstract: This new protocol is based on the idea of introducing a revocable anonymity in Tor, which was presented in our recent paper entitled "Another Tor is possible". Compared to that previous paper, this present scheme simplify the first protocol and reduce the power of the directory server, while maintaining the ability for the Tor community, to break the anonymity of a sender in case of misconduct.

We also take the opportunity of this paper, to appeal the majors internet companies, to help in the creation of a responsible Tor network (without pedophiles, spies, ....), by mixing billions of data flowing through their networks with those of Tor.

Category / Keywords: applications / Tor, cryptography, privacy, anonymity, secret sharing.

Date: received 6 Mar 2015

Contact author: amadou1 at gmail com

Available format(s): PDF | BibTeX Citation

Version: 20150308:083702 (All versions of this report)

Short URL: ia.cr/2015/215

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]