Title | ||
---|---|---|
Establishing secure and anonymous communication channel: KEM/DEM-based construction and its implementation. |
Abstract | ||
---|---|---|
Several cryptographic tools provide anonymity in a cryptographic sense, but solely using such a tool does not guarantee anonymity; for example, even if the underlying cryptographic primitives enable anonymity in some sense, a communication system using these tools may reveal the senders’ IP address. Moreover, since a certificate of public key infrastructure contains information of a key holder, and that contradicts anonymity of the key holder, the certificate must be removed. Therefore, it seems difficult to check the validity of the public key in an anonymous environment. That is, constructing a secure and anonymous communication protocol, where end-to-end encryption and anonymous authentication are achieved simultaneously, is an important issue to be solved. |
Year | DOI | Venue |
---|---|---|
2017 | 10.1016/j.jisa.2016.12.001 | Journal of Information Security and Applications |
Keywords | Field | DocType |
Anonymous communication,Anonymous authentication,Secure channel,Key encapsulated mechanism,Data encapsulation mechanism,Group signature | Public key infrastructure,Cryptographic protocol,Computer security,Computer science,Encryption,Cryptographic primitive,Authentication protocol,ElGamal encryption,Public-key cryptography,Universal composability | Journal |
Volume | ISSN | Citations |
34 | 2214-2126 | 0 |
PageRank | References | Authors |
0.34 | 18 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Keita Emura | 1 | 316 | 36.97 |
Akira Kanaoka | 2 | 45 | 11.62 |
Satoshi Ohta | 3 | 4 | 1.10 |
Takeshi Takahashi | 4 | 26 | 8.82 |