• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Sui Hongfei, Chen Jian'er, Chen Songqiao, and Zhu Nafei. Secret Sharing-Based Rerouting in Rerouting-Based Anonymous Communication Systems[J]. Journal of Computer Research and Development, 2005, 42(10): 1660-1666.
Citation: Sui Hongfei, Chen Jian'er, Chen Songqiao, and Zhu Nafei. Secret Sharing-Based Rerouting in Rerouting-Based Anonymous Communication Systems[J]. Journal of Computer Research and Development, 2005, 42(10): 1660-1666.

Secret Sharing-Based Rerouting in Rerouting-Based Anonymous Communication Systems

More Information
  • Published Date: October 14, 2005
  • Rerouting is the main mechanism in rerouting-based anonymous communication system for protecting the anonymity of communication participant. Next hop rerouting, an important type of rerouting that is adopted in many rerouting-based anonymous communication systems, is easy to compromise by predecessor attack, and has the drawback of high communication delay. In this paper, a new next hop rerouting mechanism, secret sharing-based rerouting(SSR), is proposed based on threshold scheme. With this mechanism, end-to-end encryption between the sender and the last intermediator on the rerouting path can be achieved. Thus, the complexity for attackers to compromise the anonymity is made high. Theoretical analysis demonstrates that the complexity can be kept on the same level as source rerouting. Moreover, the sender can control the path length effectively, therefore limiting the communication delay.
  • Related Articles

    [1]Liu Yanxiao, Wu Ping, Sun Qindong. Secret Image Sharing Schemes Based on Region Convolution Neural Network[J]. Journal of Computer Research and Development, 2021, 58(5): 1065-1074. DOI: 10.7544/issn1000-1239.2021.20200898
    [2]Liu Hai, Li Xinghua, Ma Jianfeng. Rational Secret Sharing Scheme Based on Reconstruction Order Adjustment Mechanism[J]. Journal of Computer Research and Development, 2015, 52(10): 2332-2340. DOI: 10.7544/issn1000-1239.2015.20150511
    [3]Zhou Yousheng, Wang Feng, Qing Sihan, Yang Yixian, Niu Xinxin. Dynamic Multi-Secret Sharing Scheme Based on Cellular Automata[J]. Journal of Computer Research and Development, 2012, 49(9): 1999-2004.
    [4]Qin Chuan, Chang Chin Chen, Guo Cheng. Perceptual Robust Image Hashing Scheme Based on Secret Sharing[J]. Journal of Computer Research and Development, 2012, 49(8): 1690-1698.
    [5]Zhang Haibo, Wang Xiaofei, and Huang Youpeng. General Results on Secret Sharing Based on General Access Structure[J]. Journal of Computer Research and Development, 2010, 47(2): 207-215.
    [6]Huang Dongping, Liu Duo, and Dai Yiqi. Weighted Threshold Secret Sharing[J]. Journal of Computer Research and Development, 2007, 44(8): 1378-1382.
    [7]Pang Liaojun, Jiang Zhengtao, and Wang Yumin. A Multi-Secret Sharing Scheme Based on the General Access Structure[J]. Journal of Computer Research and Development, 2006, 43(1): 33-38.
    [8]Yu Jia, Li Daxing, Fan Yuling. Verifiable Secret Redistribution Protocol Based on Additive Sharing[J]. Journal of Computer Research and Development, 2006, 43(1): 23-27.
    [9]Wang Guilin, Qing Sihan. Security Notes on Two Cheat-Proof Secret Sharing Schemes[J]. Journal of Computer Research and Development, 2005, 42(11): 1924-1927.
    [10]Guo Yuanbo, Ma Jianfeng, Wang Yadi. An Efficient Secret Sharing Scheme Realizing Graph-Based Adversary Structures[J]. Journal of Computer Research and Development, 2005, 42(5): 877-882.

Catalog

    Article views (624) PDF downloads (520) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return