Stronger Bridge Mechanisms of Tor which Take into Consideration Exhaustive Adversarial Models
-
- Feng Fei
- Institute of Industrial Science, The University of Tokyo
-
- Matsuura Kanta
- Institute of Industrial Science, The University of Tokyo
この論文をさがす
抄録
Tor is the most popular anonymous communication tool in the world. Its anonymity, however, has not been thoroughly evaluated. For example, it is possible for an adversary to restrict access to the Tor network by blocking all the publicly listed relays. In response, Tor utilizes bridges, which are unlisted relays, as alternative entry points. However, the vulnerabilities of the current bridge mechanism have not been thoroughly investigated yet. We first investigate the vulnerabilities of the current bridge mechanism under different adversarial models. Then we compare the current bridge mechanism with our two proposals and discuss their effects on the security and performance of Tor.
収録刊行物
-
- Journal of Information Processing
-
Journal of Information Processing 23 (5), 646-654, 2015
一般社団法人 情報処理学会
- Tweet
キーワード
詳細情報 詳細情報について
-
- CRID
- 1390001205295123840
-
- NII論文ID
- 130005100086
-
- NII書誌ID
- AA00700121
-
- ISSN
- 18826652
-
- 本文言語コード
- en
-
- データソース種別
-
- JaLC
- IRDB
- Crossref
- CiNii Articles
- KAKEN
-
- 抄録ライセンスフラグ
- 使用不可