A formal treatment of onion routing

89Citations
Citations of this article
90Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Anonymous channels are necessary for a multitude of privacy-protecting protocols. Onion routing is probably the best known way to achieve anonymity in practice. However, the cryptographic aspects of onion routing have not been sufficiently explored: no satisfactory definitions of security have been given, and existing constructions have only had ad-hoc security analysis for the most part. We provide a formal definition of onion-routing in the universally composable framework, and also discover a simpler definition (similar to CCA2 security for encryption) that implies security in the UC frame-work. We then exhibit an efficient and easy to implement construction of an onion routing scheme satisfying this definition. © International Association for Cryptologic Research 2005.

Cite

CITATION STYLE

APA

Camenisch, J., & Lysyanskaya, A. (2006). A formal treatment of onion routing. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3621 LNCS, pp. 169–187). https://doi.org/10.1007/11535218_11

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free