Cryptanalysis of a hybrid-structured onion routing scheme
SHI Jin-qiao et al's hybrid-structured onion routing scheme was analysed and some security flaws were found in their design.The first flaw was derived from the malleability of its cryptographic message format which could be exploited by attackers to redirect an onion message or embed tags into...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2013-04-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2013.04.010/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539798149365760 |
---|---|
author | Long-hai LI Shao-feng FU Rui-dan SU Xiang-quan CHE |
author_facet | Long-hai LI Shao-feng FU Rui-dan SU Xiang-quan CHE |
author_sort | Long-hai LI |
collection | DOAJ |
description | SHI Jin-qiao et al's hybrid-structured onion routing scheme was analysed and some security flaws were found in their design.The first flaw was derived from the malleability of its cryptographic message format which could be exploited by attackers to redirect an onion message or embed tags into it for tracing its routing path.The second flaw was the vulnerability of relay servers to chosen ciphertext attack.Three different attacks were presented that each broke the sender-receiver unlinkability entirely at a relatively low co To evade these attacks,a modified scheme was also proposed which could capture malicious nodes by using upstream investigation. |
format | Article |
id | doaj-art-3b416d28f96b4ee2ae31a42fc7fadd84 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2013-04-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-3b416d28f96b4ee2ae31a42fc7fadd842025-01-14T06:35:03ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2013-04-0134889859671427Cryptanalysis of a hybrid-structured onion routing schemeLong-hai LIShao-feng FURui-dan SUXiang-quan CHESHI Jin-qiao et al's hybrid-structured onion routing scheme was analysed and some security flaws were found in their design.The first flaw was derived from the malleability of its cryptographic message format which could be exploited by attackers to redirect an onion message or embed tags into it for tracing its routing path.The second flaw was the vulnerability of relay servers to chosen ciphertext attack.Three different attacks were presented that each broke the sender-receiver unlinkability entirely at a relatively low co To evade these attacks,a modified scheme was also proposed which could capture malicious nodes by using upstream investigation.http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2013.04.010/anonymous communicationonion routinguniversal re-encryptionhybrid structure |
spellingShingle | Long-hai LI Shao-feng FU Rui-dan SU Xiang-quan CHE Cryptanalysis of a hybrid-structured onion routing scheme Tongxin xuebao anonymous communication onion routing universal re-encryption hybrid structure |
title | Cryptanalysis of a hybrid-structured onion routing scheme |
title_full | Cryptanalysis of a hybrid-structured onion routing scheme |
title_fullStr | Cryptanalysis of a hybrid-structured onion routing scheme |
title_full_unstemmed | Cryptanalysis of a hybrid-structured onion routing scheme |
title_short | Cryptanalysis of a hybrid-structured onion routing scheme |
title_sort | cryptanalysis of a hybrid structured onion routing scheme |
topic | anonymous communication onion routing universal re-encryption hybrid structure |
url | http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2013.04.010/ |
work_keys_str_mv | AT longhaili cryptanalysisofahybridstructuredonionroutingscheme AT shaofengfu cryptanalysisofahybridstructuredonionroutingscheme AT ruidansu cryptanalysisofahybridstructuredonionroutingscheme AT xiangquanche cryptanalysisofahybridstructuredonionroutingscheme |