Paper 2014/787
Another Tor is possible
Amadou Moctar Kane
Abstract
The aim of this paper is to introduce some modifications in Tor, in order to improve user’s anonymity and relay’s security. Thus, we introduced a system that will ensure anonymity for all users, while maintaining the ability to break the anonymity of a sender in case of misconduct. The revocation of the anonymity will require the use of secret sharing schemes, since we assume that, the lifting of the anonymity of the dishonest user should not depend on a single entity, but on a consensus within the network. In addition to the revocation of the anonymity, we propose in this paper further improvements such as mixing Tor traffic with those of the major internet groups, using the camouflage, or introducing a honeypot in the network.
Metadata
- Available format(s)
- Category
- Applications
- Publication info
- Preprint. MINOR revision.
- Keywords
- Torcryptographyprivacyanonymitysecret sharing.
- Contact author(s)
- amadou1 @ gmail com
- History
- 2014-10-07: received
- Short URL
- https://ia.cr/2014/787
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2014/787, author = {Amadou Moctar Kane}, title = {Another Tor is possible}, howpublished = {Cryptology {ePrint} Archive, Paper 2014/787}, year = {2014}, url = {https://eprint.iacr.org/2014/787} }