Untagging Tor: A Formal Treatment of Onion Encryption

@article{Degabriele2018UntaggingTA,
  title={Untagging Tor: A Formal Treatment of Onion Encryption},
  author={Jean Paul Degabriele and Martijn Stam},
  journal={IACR Cryptology ePrint Archive},
  year={2018},
  volume={2018},
  pages={162}
}
Tor is a primary tool for maintaining anonymity online. It provides a low-latency, circuit-based, bidirectional secure channel between two parties through a network of onion routers, with the aim of obscuring exactly who is talking to whom, even to adversaries controlling part of the network. Tor relies heavily on cryptographic techniques, yet its onion encryption scheme is susceptible to tagging attacks (Fu and Ling, 2009), which allow an active adversary controlling the first and last node of… CONTINUE READING
1 Extracted Citations
43 Extracted References
Similar Papers

Citing Papers

Publications influenced by this paper.

Referenced Papers

Publications referenced by this paper.
Showing 1-10 of 43 references

Proposal 261: AEZ for relay cryptography

  • Nick Mathewson
  • https://lists.torproject.org/pipermail/tor-dev…
  • 2015
Highly Influential
4 Excerpts

Proposal 202: Two improved relay encryption protocols for Tor cells

  • Nick Mathewson
  • 2012
Highly Influential
4 Excerpts

Untagging Tor: A formal treatment of onion encryption

  • Jean Paul Degabriele, Martijn Stam
  • Cryptology ePrint Archive, Report 2018/XXX,
  • 2018
5 Excerpts

Murdoch and Piotr Zielinski . Sampled traffic analysis by internetexchangelevel adversaries

  • J Steven
  • Privacy Enhancing Technologies ( PET 2007 )
  • 2017

Similar Papers

Loading similar papers…