Paper 2014/787

Another Tor is possible

Amadou Moctar Kane

Abstract

The aim of this paper is to introduce some modifications in Tor, in order to improve user’s anonymity and relay’s security. Thus, we introduced a system that will ensure anonymity for all users, while maintaining the ability to break the anonymity of a sender in case of misconduct. The revocation of the anonymity will require the use of secret sharing schemes, since we assume that, the lifting of the anonymity of the dishonest user should not depend on a single entity, but on a consensus within the network. In addition to the revocation of the anonymity, we propose in this paper further improvements such as mixing Tor traffic with those of the major internet groups, using the camouflage, or introducing a honeypot in the network.

Metadata
Available format(s)
PDF
Category
Applications
Publication info
Preprint. MINOR revision.
Keywords
Torcryptographyprivacyanonymitysecret sharing.
Contact author(s)
amadou1 @ gmail com
History
2014-10-07: received
Short URL
https://ia.cr/2014/787
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2014/787,
      author = {Amadou Moctar Kane},
      title = {Another Tor is possible},
      howpublished = {Cryptology ePrint Archive, Paper 2014/787},
      year = {2014},
      note = {\url{https://eprint.iacr.org/2014/787}},
      url = {https://eprint.iacr.org/2014/787}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.