1 Anonymity in Network Communication |
|
1 | (14) |
|
1.1 Right to Be Anonymous |
|
|
2 | (6) |
|
1.2 When We Need to Be Anonymous |
|
|
8 | (2) |
|
1.3 The Current Situation and Where We Start |
|
|
10 | (5) |
2 Mix Networks |
|
15 | (48) |
|
2.1 Definition of Mix Network |
|
|
16 | (1) |
|
2.2 Classification of Mix Networks |
|
|
17 | (5) |
|
2.2.1 Decryption Chain or Re-encryption |
|
|
17 | (2) |
|
2.2.2 General or Separate Verification |
|
|
19 | (2) |
|
2.2.3 Tag Attached to Input |
|
|
21 | (1) |
|
|
22 | (1) |
|
2.3 Efficient and Secure GMN: a Simple and Efficient Solution |
|
|
22 | (5) |
|
|
24 | (2) |
|
2.3.2 Analysis and Summary |
|
|
26 | (1) |
|
2.4 Efficient and Secure SMN: the Most Important Mix Network |
|
|
27 | (11) |
|
2.4.1 SMN Employing Multiplicative Homomorphic Encryption Algorithm |
|
|
32 | (3) |
|
2.4.2 SMN Employing Additive Homomorphic Encryption Algorithm |
|
|
35 | (3) |
|
2.5 Grouped Shuffling: a Trade-off to Improve Efficiency of Mix Networks |
|
|
38 | (11) |
|
2.5.1 Group Shuffling in [ 93] |
|
|
39 | (5) |
|
2.5.2 Another Grouped Shuffling Protocol to Support Efficient SMN |
|
|
44 | (5) |
|
2.6 Survey and Analysis of SMN |
|
|
49 | (8) |
|
2.6.1 The Assumptions Needed in the Mix Networks in [ 51] and [ 52] |
|
|
50 | (3) |
|
2.6.2 Security Concerns in [ 90] and [ 102] |
|
|
53 | (2) |
|
2.6.3 Failure in Functionality of the Mix Network by Wikstrom |
|
|
55 | (2) |
|
2.7 Efficiency of SMN: Claim and Reality |
|
|
57 | (4) |
|
2.7.1 Unfair Usage of Short Exponents |
|
|
58 | (1) |
|
2.7.2 Other Unfair Factors in Efficiency Claim and Comparison |
|
|
59 | (1) |
|
2.7.3 Re-evaluating Efficiency |
|
|
59 | (2) |
|
|
61 | (2) |
3 Application of Mix Network to E-Voting: a Case Study |
|
63 | (52) |
|
3.1 Mix Network for E-Voting |
|
|
63 | (15) |
|
3.1.1 The Recent Mix Network Schemes |
|
|
64 | (2) |
|
3.1.2 The New Mix Network |
|
|
66 | (6) |
|
3.1.3 Security and Efficiency Analysis |
|
|
72 | (4) |
|
3.1.4 Extension and Application |
|
|
76 | (2) |
|
3.2 Mix Network-Based E-Voting |
|
|
78 | (3) |
|
3.3 Security Concerns and Suggested Solution in Practice |
|
|
81 | (18) |
|
3.3.1 Various Relation Attacks and the Existing Countermeasures |
|
|
83 | (5) |
|
3.3.2 Main Idea of the New Countermeasure |
|
|
88 | (3) |
|
3.3.3 A Prototype and Its Drawbacks |
|
|
91 | (2) |
|
3.3.4 Optimization and Security Analysis |
|
|
93 | (6) |
|
3.4 Off-Line Pre-Computation in Mix Networks |
|
|
99 | (16) |
|
3.4.1 Security Model of Shuffles |
|
|
102 | (1) |
|
|
103 | (3) |
|
3.4.3 Off-Line Pre-Computation and Batch Verification |
|
|
106 | (2) |
|
3.4.4 The Final Shuffling Protocol: Modifying Encryption and Further Improving Efficiency |
|
|
108 | (3) |
|
3.4.5 Comparison and Conclusion |
|
|
111 | (4) |
4 Onion Routing |
|
115 | (22) |
|
|
115 | (2) |
|
4.2 Formal Definition of Security |
|
|
117 | (7) |
|
4.3 Second Generation: Tor |
|
|
124 | (13) |
|
|
127 | (6) |
|
4.3.2 Application of Symmetric Cipher and Diffie-Hellman Key Exchange in Tor: Efficiency Improvement |
|
|
133 | (4) |
5 Optimisation and Practical Application of Onion Routing |
|
137 | (28) |
|
5.1 Verifiable TOR: a Verifiable Application of Onion Routing |
|
|
137 | (5) |
|
|
138 | (1) |
|
5.1.2 Advanced Tor with a Verification Mechanism |
|
|
139 | (3) |
|
5.2 Efficiency Improvment Using Diffie-Hellman Chain |
|
|
142 | (9) |
|
5.2.1 A Simple Optimisation of Tor and its Drawback: Simpler but Still Direct Application of Diffie-Hellman Key Exchange |
|
|
143 | (1) |
|
5.2.2 A New and More Advanced Technique: Diffie-Hellman Chain |
|
|
144 | (3) |
|
5.2.3 Analysis and Comparison |
|
|
147 | (1) |
|
5.2.4 Further Optimisation: Small Compressed Onion Routing |
|
|
148 | (3) |
|
5.3 A Practical Application: Paid and Anonymous Use of Cloud Softwares |
|
|
151 | (14) |
|
5.3.1 How to Obtain Anonymous Usage Permit of a Cloud Software: Anonymous Token |
|
|
153 | (2) |
|
5.3.2 Two-Way Onion Routing to Support Anonymous Usage of Cloud Software |
|
|
155 | (3) |
|
5.3.3 Efficiency Optimisation: Two-Way Onion Routing with Compact Diffie-Hellman Handshakes |
|
|
158 | (4) |
|
|
162 | (3) |
6 Practical Systems to Achieve Anonymity: How to Use Them |
|
165 | (18) |
|
6.1 Installation and Usage of Tor |
|
|
166 | (3) |
|
6.1.1 Download and Installation |
|
|
166 | (2) |
|
|
168 | (1) |
|
6.2 Installation and Usage of I2P |
|
|
169 | (5) |
|
6.2.1 Download and Installation |
|
|
169 | (4) |
|
|
173 | (1) |
|
6.3 Installation and Usage of JAP/JonDo |
|
|
174 | (4) |
|
6.3.1 Download and Installation |
|
|
175 | (1) |
|
|
176 | (2) |
|
6.4 Installation and Usage of QuickSilver |
|
|
178 | (5) |
|
6.4.1 Download and Installation |
|
|
178 | (2) |
|
|
180 | (3) |
References |
|
183 | (8) |
Index |
|
191 | |