tor-design.bib 34 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025
  1. @inproceedings{tarzan:ccs02,
  2. title = {Tarzan: A Peer-to-Peer Anonymizing Network Layer},
  3. author = {Michael J. Freedman and Robert Morris},
  4. booktitle = {Proceedings of the 9th {ACM} {C}onference on {C}omputer and {C}ommunications
  5. {S}ecurity ({CCS 2002})},
  6. year = {2002},
  7. month = {November},
  8. address = {Washington, DC},
  9. }
  10. @inproceedings{cebolla,
  11. title = {{Cebolla: Pragmatic IP Anonymity}},
  12. author = {Zach Brown},
  13. booktitle = {Proceedings of the 2002 Ottawa Linux Symposium},
  14. year = {2002},
  15. month = {June},
  16. }
  17. @misc{eax,
  18. author = "M. Bellare and P. Rogaway and D. Wagner",
  19. title = "A conventional authenticated-encryption mode",
  20. howpublished = {Manuscript},
  21. month = {April},
  22. year = {2003},
  23. }
  24. @misc{darkside,
  25. title = {{The Dark Side of the Web: An Open Proxy's View}},
  26. author = {Vivek S. Pai and Limin Wang and KyoungSoo Park and Ruoming Pang and Larry Peterson},
  27. note = {Submitted to HotNets-II. \url{http://codeen.cs.princeton.edu/}},
  28. }
  29. @Misc{anonymizer,
  30. key = {anonymizer},
  31. title = {The {Anonymizer}},
  32. note = {\url{http://anonymizer.com/}}
  33. }
  34. @Misc{privoxy,
  35. key = {privoxy},
  36. title = {{Privoxy}},
  37. note = {\url{http://www.privoxy.org/}}
  38. }
  39. @inproceedings{RRMPH02-1,
  40. title = {{Analysis of an Anonymity Network for Web Browsing}},
  41. author = {Marc Rennhard and Sandro Rafaeli and Laurent Mathy and Bernhard Plattner and
  42. David Hutchison},
  43. booktitle = {{Proceedings of the IEEE 7th Intl. Workshop on Enterprise Security (WET ICE
  44. 2002)}},
  45. year = {2002},
  46. month = {June},
  47. address = {Pittsburgh, USA},
  48. pages = {49--54},
  49. }
  50. @Misc{anonnet,
  51. key = {anonnet},
  52. title = {{AnonNet}},
  53. note = {\url{http://www.authnet.org/anonnet/}}
  54. }
  55. % can somebody track down the rest of this? -RD
  56. @Misc{castro-liskov,
  57. author = {Miguel Castro and Barbara Liskov},
  58. title = {Proactive Recovery in a Byzantine-Fault-Tolerant System},
  59. howpublished = {
  60. $<$http://www.pmg.lcs.mit.edu/$\tilde{\hspace{5pt}}$castro/application/recovery.pdf$>$},
  61. }
  62. @inproceedings{econymics,
  63. title = {On the Economics of Anonymity},
  64. author = {Alessandro Acquisti and Roger Dingledine and Paul Syverson},
  65. booktitle = {Financial Cryptography, FC 2003},
  66. year = {2003},
  67. editor = {Rebecca N. Wright},
  68. publisher = {Springer-Verlag, LNCS 2742},
  69. note = {\url{http://freehaven.net/doc/fc03/econymics.pdf}},
  70. }
  71. @inproceedings{defensive-dropping,
  72. title = {Stopping Timing Attacks in Low-Latency Mix-Based Systems},
  73. author = {Matthew Wright and Brian N. Levine and Michael K. Reiter and Chenxi Wang},
  74. booktitle = {Financial Cryptography, FC 2004},
  75. year = {2004},
  76. editor = {Ari Juels},
  77. publisher = {Springer-Verlag, LNCS (forthcoming)},
  78. }
  79. @inproceedings{morphmix:fc04,
  80. title = {Practical Anonymity for the Masses with MorphMix},
  81. author = {Marc Rennhard and Bernhard Plattner},
  82. booktitle = {Financial Cryptography, FC 2004},
  83. year = {2004},
  84. editor = {Ari Juels},
  85. publisher = {Springer-Verlag, LNCS (forthcoming)},
  86. }
  87. @inproceedings{eternity,
  88. title = {The Eternity Service},
  89. author = {Ross Anderson},
  90. booktitle = {Proceedings of Pragocrypt '96},
  91. year = {1996},
  92. note = {\url{http://www.cl.cam.ac.uk/users/rja14/eternity/eternity.html}},
  93. }
  94. @inproceedings{minion-design,
  95. title = {Mixminion: Design of a Type {III} Anonymous Remailer Protocol},
  96. author = {George Danezis and Roger Dingledine and Nick Mathewson},
  97. booktitle = {2003 IEEE Symposium on Security and Privacy},
  98. year = {2003},
  99. month = {May},
  100. publisher = {IEEE CS},
  101. pages = {2--15},
  102. note = {\url{http://mixminion.net/minion-design.pdf}},
  103. www_important = {1},
  104. www_section = {Anonymous communication},
  105. }
  106. @inproceedings{ rao-pseudonymity,
  107. author = "Josyula R. Rao and Pankaj Rohatgi",
  108. title = "Can Pseudonymity Really Guarantee Privacy?",
  109. booktitle = "Proceedings of the Ninth USENIX Security Symposium",
  110. year = {2000},
  111. month = Aug,
  112. publisher = {USENIX},
  113. pages = "85--96",
  114. note = {\url{http://www.usenix.org/publications/library/proceedings/sec2000/
  115. full_papers/rao/rao.pdf}},
  116. }
  117. @InProceedings{pfitzmann90how,
  118. author = "Birgit Pfitzmann and Andreas Pfitzmann",
  119. title = "How to Break the Direct {RSA}-Implementation of {MIXes}",
  120. booktitle = {Eurocrypt 89},
  121. publisher = {Springer-Verlag, LNCS 434},
  122. year = {1990},
  123. note = {\url{http://citeseer.nj.nec.com/pfitzmann90how.html}},
  124. }
  125. % author = {Roger Dingledine and Nick Mathewson},
  126. @Misc{tor-spec,
  127. author = {Anonymized},
  128. title = {Tor Protocol Specifications},
  129. note = {\url{http://freehaven.net/tor/tor-spec.txt}},
  130. }
  131. @InProceedings{BM:mixencrypt,
  132. author = {M{\"o}ller, Bodo},
  133. title = {Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes},
  134. booktitle = {{CT-RSA} 2003},
  135. publisher = {Springer-Verlag, LNCS 2612},
  136. year = 2003,
  137. }
  138. % Would a more recent reference for SPRPs be more useful?
  139. @Article{sprp,
  140. author = {Michael Luby and Charles Rackoff},
  141. title = {How to Construct Pseudorandom Permutations from
  142. Pseudorandom Functions},
  143. journal = {SIAM Journal on Computing},
  144. year = {1988},
  145. volume = {17},
  146. number = {2},
  147. pages = {373--386},
  148. }
  149. @InProceedings{back01,
  150. author = {Adam Back and Ulf M\"oller and Anton Stiglic},
  151. title = {Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems},
  152. booktitle = {Information Hiding (IH 2001)},
  153. pages = {245--257},
  154. year = 2001,
  155. editor = {Ira S. Moskowitz},
  156. publisher = {Springer-Verlag, LNCS 2137},
  157. note = {\newline \url{http://www.cypherspace.org/adam/pubs/traffic.pdf}},
  158. }
  159. @InProceedings{rackoff93cryptographic,
  160. author = {Charles Rackoff and Daniel R. Simon},
  161. title = {Cryptographic Defense Against Traffic Analysis},
  162. booktitle = {{ACM} Symposium on Theory of Computing},
  163. pages = {672--681},
  164. year = {1993},
  165. note = {\url{http://research.microsoft.com/crypto/dansimon/me.htm}},
  166. }
  167. @InProceedings{freehaven-berk,
  168. author = {Roger Dingledine and Michael J. Freedman and David Molnar},
  169. title = {The Free Haven Project: Distributed Anonymous Storage Service},
  170. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  171. on Design Issue in Anonymity and Unobservability},
  172. year = {2000},
  173. month = {July},
  174. editor = {H. Federrath},
  175. publisher = {Springer-Verlag, LNCS 2009},
  176. note = {\url{http://freehaven.net/papers.html}},
  177. }
  178. @InProceedings{raymond00,
  179. author = {J. F. Raymond},
  180. title = {{Traffic Analysis: Protocols, Attacks, Design Issues,
  181. and Open Problems}},
  182. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  183. on Design Issue in Anonymity and Unobservability},
  184. year = 2000,
  185. month = {July},
  186. pages = {10-29},
  187. editor = {H. Federrath},
  188. publisher = {Springer-Verlag, LNCS 2009},
  189. }
  190. @InProceedings{trickle02,
  191. author = {Andrei Serjantov and Roger Dingledine and Paul Syverson},
  192. title = {From a Trickle to a Flood: Active Attacks on Several
  193. Mix Types},
  194. booktitle = {Information Hiding (IH 2002)},
  195. year = {2002},
  196. editor = {Fabien Petitcolas},
  197. publisher = {Springer-Verlag, LNCS 2578},
  198. }
  199. @InProceedings{langos02,
  200. author = {Oliver Berthold and Heinrich Langos},
  201. title = {Dummy Traffic Against Long Term Intersection Attacks},
  202. booktitle = {Privacy Enhancing Technologies (PET 2002)},
  203. year = {2002},
  204. editor = {Roger Dingledine and Paul Syverson},
  205. publisher = {Springer-Verlag, LNCS 2482}
  206. }
  207. @InProceedings{or-discex00,
  208. author = {Paul Syverson and Michael Reed and David Goldschlag},
  209. title = {{O}nion {R}outing Access Configurations},
  210. booktitle = {DARPA Information Survivability Conference and
  211. Exposition (DISCEX 2000)},
  212. year = {2000},
  213. publisher = {IEEE CS Press},
  214. pages = {34--40},
  215. volume = {1},
  216. note = {\newline \url{http://www.onion-router.net/Publications.html}},
  217. }
  218. @Inproceedings{or-pet00,
  219. title = {{Towards an Analysis of Onion Routing Security}},
  220. author = {Paul Syverson and Gene Tsudik and Michael Reed and
  221. Carl Landwehr},
  222. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  223. on Design Issue in Anonymity and Unobservability},
  224. year = 2000,
  225. month = {July},
  226. pages = {96--114},
  227. editor = {H. Federrath},
  228. publisher = {Springer-Verlag, LNCS 2009},
  229. note = {\url{http://www.onion-router.net/Publications/WDIAU-2000.ps.gz}},
  230. }
  231. @Inproceedings{freenet-pets00,
  232. title = {Freenet: A Distributed Anonymous Information Storage
  233. and Retrieval System},
  234. author = {Ian Clarke and Oskar Sandberg and Brandon Wiley and
  235. Theodore W. Hong},
  236. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  237. on Design Issue in Anonymity and Unobservability},
  238. year = 2000,
  239. month = {July},
  240. pages = {46--66},
  241. editor = {H. Federrath},
  242. publisher = {Springer-Verlag, LNCS 2009},
  243. note = {\url{http://citeseer.nj.nec.com/clarke00freenet.html}},
  244. }
  245. @InProceedings{or-ih96,
  246. author = {David M. Goldschlag and Michael G. Reed and Paul
  247. F. Syverson},
  248. title = {Hiding Routing Information},
  249. booktitle = {Information Hiding, First International Workshop},
  250. pages = {137--150},
  251. year = 1996,
  252. editor = {R. Anderson},
  253. month = {May},
  254. publisher = {Springer-Verlag, LNCS 1174},
  255. note = {\url{http://www.onion-router.net/Publications/IH-1996.ps.gz}}
  256. }
  257. @Article{or-jsac98,
  258. author = {Michael G. Reed and Paul F. Syverson and David
  259. M. Goldschlag},
  260. title = {Anonymous Connections and Onion Routing},
  261. journal = {IEEE Journal on Selected Areas in Communications},
  262. year = 1998,
  263. volume = 16,
  264. number = 4,
  265. pages = {482--494},
  266. month = {May},
  267. note = {\url{http://www.onion-router.net/Publications/JSAC-1998.ps.gz}}
  268. }
  269. @Misc{TLS,
  270. author = {T. Dierks and C. Allen},
  271. title = {The {TLS} {P}rotocol --- {V}ersion 1.0},
  272. howpublished = {IETF RFC 2246},
  273. month = {January},
  274. year = {1999},
  275. note = {\url{http://www.rfc-editor.org/rfc/rfc2246.txt}},
  276. }
  277. @Misc{SMTP,
  278. author = {J. Postel},
  279. title = {Simple {M}ail {T}ransfer {P}rotocol},
  280. howpublished = {IETF RFC 2821 (also STD0010)},
  281. month = {April},
  282. year = {2001},
  283. note = {\url{http://www.rfc-editor.org/rfc/rfc2821.txt}},
  284. }
  285. @Misc{IMAP,
  286. author = {M. Crispin},
  287. title = {Internet {M}essage {A}ccess {P}rotocol --- {V}ersion 4rev1},
  288. howpublished = {IETF RFC 2060},
  289. month = {December},
  290. year = {1996},
  291. note = {\url{http://www.rfc-editor.org/rfc/rfc2060.txt}},
  292. }
  293. @misc{pipenet,
  294. title = {PipeNet 1.1},
  295. author = {Wei Dai},
  296. year = 1996,
  297. month = {August},
  298. howpublished = {Usenet post},
  299. note = {\url{http://www.eskimo.com/~weidai/pipenet.txt} First mentioned
  300. in a post to the cypherpunks list, Feb.\ 1995.},
  301. }
  302. @Misc{POP3,
  303. author = {J. Myers and M. Rose},
  304. title = {Post {O}ffice {P}rotocol --- {V}ersion 3},
  305. howpublished = {IETF RFC 1939 (also STD0053)},
  306. month = {May},
  307. year = {1996},
  308. note = {\url{http://www.rfc-editor.org/rfc/rfc1939.txt}},
  309. }
  310. @InProceedings{shuffle,
  311. author = {C. Andrew Neff},
  312. title = {A Verifiable Secret Shuffle and its Application to E-Voting},
  313. booktitle = {8th ACM Conference on Computer and Communications
  314. Security (CCS-8)},
  315. pages = {116--125},
  316. year = 2001,
  317. editor = {P. Samarati},
  318. month = {November},
  319. publisher = {ACM Press},
  320. note = {\url{http://www.votehere.net/ada_compliant/ourtechnology/
  321. technicaldocs/shuffle.pdf}},
  322. }
  323. @InProceedings{dolev91,
  324. author = {Danny Dolev and Cynthia Dwork and Moni Naor},
  325. title = {Non-Malleable Cryptography},
  326. booktitle = {23rd ACM Symposium on the Theory of Computing (STOC)},
  327. pages = {542--552},
  328. year = 1991,
  329. note = {Updated version at
  330. \url{http://citeseer.nj.nec.com/dolev00nonmalleable.html}},
  331. }
  332. @TechReport{rsw96,
  333. author = {Ronald L. Rivest and Adi Shamir and David A. Wagner},
  334. title = {Time-lock puzzles and timed-release Crypto},
  335. year = 1996,
  336. type = {MIT LCS technical memo},
  337. number = {MIT/LCS/TR-684},
  338. month = {February},
  339. note = {\newline \url{http://citeseer.nj.nec.com/rivest96timelock.html}},
  340. }
  341. @InProceedings{web-mix,
  342. author = {Oliver Berthold and Hannes Federrath and Stefan K\"opsell},
  343. title = {Web {MIX}es: A system for anonymous and unobservable
  344. {I}nternet access},
  345. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  346. on Design Issue in Anonymity and Unobservability},
  347. editor = {H. Federrath},
  348. publisher = {Springer-Verlag, LNCS 2009},
  349. pages = {115--129},
  350. year = 2000,
  351. }
  352. @InProceedings{disad-free-routes,
  353. author = {Oliver Berthold and Andreas Pfitzmann and Ronny Standtke},
  354. title = {The disadvantages of free {MIX} routes and how to overcome
  355. them},
  356. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  357. on Design Issue in Anonymity and Unobservability},
  358. pages = {30--45},
  359. year = 2000,
  360. editor = {H. Federrath},
  361. publisher = {Springer-Verlag, LNCS 2009},
  362. note = {\url{http://www.tik.ee.ethz.ch/~weiler/lehre/netsec/Unterlagen/anon/
  363. disadvantages_berthold.pdf}},
  364. }
  365. @InProceedings{boneh00,
  366. author = {Dan Boneh and Moni Naor},
  367. title = {Timed Commitments},
  368. booktitle = {Advances in Cryptology -- {CRYPTO} 2000},
  369. pages = {236--254},
  370. year = 2000,
  371. publisher = {Springer-Verlag, LNCS 1880},
  372. note = {\newline \url{http://crypto.stanford.edu/~dabo/abstracts/timedcommit.html}},
  373. }
  374. @InProceedings{goldschlag98,
  375. author = {David M. Goldschlag and Stuart G. Stubblebine},
  376. title = {Publicly Verifiable Lotteries: Applications of
  377. Delaying Functions},
  378. booktitle = {Financial Cryptography, FC'98},
  379. pages = {214--226},
  380. year = 1998,
  381. publisher = {Springer-Verlag, LNCS 1465},
  382. note = {\newline \url{http://citeseer.nj.nec.com/goldschlag98publicly.html}},
  383. }
  384. @InProceedings{syverson98,
  385. author = {Paul Syverson},
  386. title = {Weakly Secret Bit Commitment: Applications to
  387. Lotteries and Fair Exchange},
  388. booktitle = {Computer Security Foundations Workshop (CSFW11)},
  389. pages = {2--13},
  390. year = 1998,
  391. address = {Rockport Massachusetts},
  392. month = {June},
  393. publisher = {IEEE CS Press},
  394. note = {\newline \url{http://chacs.nrl.navy.mil/publications/CHACS/1998/}},
  395. }
  396. @Misc{shoup-iso,
  397. author = {Victor Shoup},
  398. title = {A Proposal for an {ISO} {S}tandard for Public Key Encryption (version 2.1)},
  399. note = {Revised December 20, 2001. \url{http://www.shoup.net/papers/}},
  400. }
  401. @Misc{shoup-oaep,
  402. author = {Victor Shoup},
  403. title = {{OAEP} Reconsidered},
  404. howpublished = {{IACR} e-print 2000/060},
  405. note = {\newline \url{http://eprint.iacr.org/2000/060/}},
  406. }
  407. @Misc{oaep-still-alive,
  408. author = {E. Fujisaki and D. Pointcheval and T. Okamoto and J. Stern},
  409. title = {{RSA}-{OAEP} is Still Alive!},
  410. howpublished = {{IACR} e-print 2000/061},
  411. note = {\newline \url{http://eprint.iacr.org/2000/061/}},
  412. }
  413. @misc{echolot,
  414. author = {Peter Palfrader},
  415. title = {Echolot: a pinger for anonymous remailers},
  416. note = {\url{http://www.palfrader.org/echolot/}},
  417. }
  418. @Misc{mixmaster-attacks,
  419. author = {Lance Cottrell},
  420. title = {Mixmaster and Remailer Attacks},
  421. note = {\url{http://www.obscura.com/~loki/remailer/remailer-essay.html}},
  422. }
  423. @Misc{mixmaster-spec,
  424. author = {Ulf M{\"o}ller and Lance Cottrell and Peter
  425. Palfrader and Len Sassaman},
  426. title = {Mixmaster {P}rotocol --- {V}ersion 2},
  427. year = {2003},
  428. month = {July},
  429. howpublished = {Draft},
  430. note = {\url{http://www.abditum.com/mixmaster-spec.txt}},
  431. }
  432. @Article{mitzenm-loss,
  433. author = {G. Louth and M. Mitzenmacher and F.P. Kelly},
  434. title = {Computational Complexity of Loss Networks},
  435. journal = {Theoretical Computer Science},
  436. year = {1994},
  437. volume = {125},
  438. pages = {45-59},
  439. note = {\newline \url{http://citeseer.nj.nec.com/louth94computational.html}},
  440. }
  441. @Misc{hashcash,
  442. author = {Adam Back},
  443. title = {Hash cash},
  444. note = {\newline \url{http://www.cypherspace.org/~adam/hashcash/}},
  445. }
  446. @InProceedings{oreilly-acc,
  447. author = {Roger Dingledine and Michael J. Freedman and David Molnar},
  448. title = {Accountability},
  449. booktitle = {Peer-to-peer: Harnessing the Benefits of a Disruptive
  450. Technology},
  451. year = {2001},
  452. publisher = {O'Reilly and Associates},
  453. }
  454. @InProceedings{han,
  455. author = {Yongfei Han},
  456. title = {Investigation of non-repudiation protocols},
  457. booktitle = {ACISP '96},
  458. year = 1996,
  459. publisher = {Springer-Verlag},
  460. }
  461. @Misc{socks5,
  462. key = {socks5},
  463. title = {{SOCKS} {P}rotocol {V}ersion 5},
  464. howpublished= {IETF RFC 1928},
  465. month = {March},
  466. year = 1996,
  467. note = {\url{http://www.ietf.org/rfc/rfc1928.txt}}
  468. }
  469. @InProceedings{abe,
  470. author = {Masayuki Abe},
  471. title = {Universally Verifiable {MIX} With Verification Work Independent of
  472. The Number of {MIX} Servers},
  473. booktitle = {{EUROCRYPT} 1998},
  474. year = {1998},
  475. publisher = {Springer-Verlag, LNCS 1403},
  476. }
  477. @InProceedings{desmedt,
  478. author = {Yvo Desmedt and Kaoru Kurosawa},
  479. title = {How To Break a Practical {MIX} and Design a New One},
  480. booktitle = {{EUROCRYPT} 2000},
  481. year = {2000},
  482. publisher = {Springer-Verlag, LNCS 1803},
  483. note = {\url{http://citeseer.nj.nec.com/447709.html}},
  484. }
  485. @InProceedings{mitkuro,
  486. author = {M. Mitomo and K. Kurosawa},
  487. title = {{Attack for Flash MIX}},
  488. booktitle = {{ASIACRYPT} 2000},
  489. year = {2000},
  490. publisher = {Springer-Verlag, LNCS 1976},
  491. note = {\newline \url{http://citeseer.nj.nec.com/450148.html}},
  492. }
  493. @InProceedings{hybrid-mix,
  494. author = {M. Ohkubo and M. Abe},
  495. title = {A {L}ength-{I}nvariant {H}ybrid {MIX}},
  496. booktitle = {Advances in Cryptology - {ASIACRYPT} 2000},
  497. year = {2000},
  498. publisher = {Springer-Verlag, LNCS 1976},
  499. }
  500. @InProceedings{PShuffle,
  501. author = {Jun Furukawa and Kazue Sako},
  502. title = {An Efficient Scheme for Proving a Shuffle},
  503. editor = {Joe Kilian},
  504. booktitle = {CRYPTO 2001},
  505. year = {2001},
  506. publisher = {Springer-Verlag, LNCS 2139},
  507. }
  508. @InProceedings{jakobsson-optimally,
  509. author = "Markus Jakobsson and Ari Juels",
  510. title = "An Optimally Robust Hybrid Mix Network (Extended Abstract)",
  511. booktitle = {Principles of Distributed Computing - {PODC} '01},
  512. year = "2001",
  513. publisher = {ACM Press},
  514. note = {\url{http://citeseer.nj.nec.com/492015.html}},
  515. }
  516. @InProceedings{kesdogan,
  517. author = {D. Kesdogan and M. Egner and T. B\"uschkes},
  518. title = {Stop-and-Go {MIX}es Providing Probabilistic Anonymity in an Open
  519. System},
  520. booktitle = {Information Hiding (IH 1998)},
  521. year = {1998},
  522. publisher = {Springer-Verlag, LNCS 1525},
  523. note = {\url{http://www.cl.cam.ac.uk/~fapp2/ihw98/ihw98-sgmix.pdf}},
  524. }
  525. @InProceedings{socks4,
  526. author = {David Koblas and Michelle R. Koblas},
  527. title = {{SOCKS}},
  528. booktitle = {UNIX Security III Symposium (1992 USENIX Security
  529. Symposium)},
  530. pages = {77--83},
  531. year = 1992,
  532. publisher = {USENIX},
  533. }
  534. @InProceedings{flash-mix,
  535. author = {Markus Jakobsson},
  536. title = {Flash {M}ixing},
  537. booktitle = {Principles of Distributed Computing - {PODC} '99},
  538. year = {1999},
  539. publisher = {ACM Press},
  540. note = {\newline \url{http://citeseer.nj.nec.com/jakobsson99flash.html}},
  541. }
  542. @InProceedings{SK,
  543. author = {Joe Kilian and Kazue Sako},
  544. title = {Receipt-Free {MIX}-Type Voting Scheme - A Practical Solution to
  545. the Implementation of a Voting Booth},
  546. booktitle = {EUROCRYPT '95},
  547. year = {1995},
  548. publisher = {Springer-Verlag},
  549. }
  550. @InProceedings{OAEP,
  551. author = {M. Bellare and P. Rogaway},
  552. year = {1994},
  553. booktitle = {EUROCRYPT '94},
  554. title = {Optimal {A}symmetric {E}ncryption {P}adding : How To Encrypt With
  555. {RSA}},
  556. publisher = {Springer-Verlag},
  557. note = {\newline \url{http://www-cse.ucsd.edu/users/mihir/papers/oaep.html}},
  558. }
  559. @inproceedings{babel,
  560. title = {Mixing {E}-mail With {B}abel},
  561. author = {Ceki G\"ulc\"u and Gene Tsudik},
  562. booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '96},
  563. year = 1996,
  564. month = {February},
  565. pages = {2--16},
  566. publisher = {IEEE},
  567. www_important = 1,
  568. note = {\url{http://citeseer.nj.nec.com/2254.html}},
  569. www_section = {Anonymous communication},
  570. }
  571. @InProceedings{freenet,
  572. author = {Ian Clarke and Oskar Sandberg and Brandon Wiley and Theodore W. Hong},
  573. title = {Freenet: {A} Distributed Anonymous Information Storage and Retrieval
  574. System},
  575. booktitle = {Workshop on Design Issues in Anonymity and Unobservability},
  576. pages = {46--66},
  577. year = {2000},
  578. note = {\newline \url{http://citeseer.nj.nec.com/clarke00freenet.html}},
  579. }
  580. @Misc{rprocess,
  581. author = {RProcess},
  582. title = {Selective Denial of Service Attacks},
  583. note = {\newline \url{http://www.eff.org/pub/Privacy/Anonymity/1999\_09\_DoS\_remail\_vuln.html}},
  584. }
  585. @Article{remailer-history,
  586. author = {Sameer Parekh},
  587. title = {Prospects for Remailers},
  588. journal = {First Monday},
  589. volume = {1},
  590. number = {2},
  591. month = {August},
  592. year = {1996},
  593. note = {\url{http://www.firstmonday.dk/issues/issue2/remailers/}},
  594. }
  595. @Article{chaum-mix,
  596. author = {David Chaum},
  597. title = {Untraceable electronic mail, return addresses, and digital pseudo-nyms},
  598. journal = {Communications of the ACM},
  599. year = {1981},
  600. volume = {4},
  601. number = {2},
  602. month = {February},
  603. note = {\url{http://www.eskimo.com/~weidai/mix-net.txt}},
  604. }
  605. @InProceedings{nym-alias-net,
  606. author = {David Mazi\`{e}res and M. Frans Kaashoek},
  607. title = {{The Design, Implementation and Operation of an Email
  608. Pseudonym Server}},
  609. booktitle = {$5^{th}$ ACM Conference on Computer and
  610. Communications Security (CCS'98)},
  611. year = 1998,
  612. publisher = {ACM Press},
  613. note = {\newline \url{http://www.scs.cs.nyu.edu/~dm/}},
  614. }
  615. @InProceedings{tangler,
  616. author = {Marc Waldman and David Mazi\`{e}res},
  617. title = {Tangler: A Censorship-Resistant Publishing System
  618. Based on Document Entanglements},
  619. booktitle = {$8^{th}$ ACM Conference on Computer and
  620. Communications Security (CCS-8)},
  621. pages = {86--135},
  622. year = 2001,
  623. publisher = {ACM Press},
  624. note = {\url{http://www.scs.cs.nyu.edu/~dm/}}
  625. }
  626. @misc{neochaum,
  627. author = {Tim May},
  628. title = {Payment mixes for anonymity},
  629. howpublished = {E-mail archived at
  630. \url{http://\newline www.inet-one.com/cypherpunks/dir.2000.02.28-2000.03.05/msg00334.html}},
  631. }
  632. @misc{helsingius,
  633. author = {J. Helsingius},
  634. title = {{\tt anon.penet.fi} press release},
  635. note = {\newline \url{http://www.penet.fi/press-english.html}},
  636. }
  637. @InProceedings{garay97secure,
  638. author = {J. Garay and R. Gennaro and C. Jutla and T. Rabin},
  639. title = {Secure distributed storage and retrieval},
  640. booktitle = {11th International Workshop, WDAG '97},
  641. pages = {275--289},
  642. year = {1997},
  643. publisher = {Springer-Verlag, LNCS 1320},
  644. note = {\newline \url{http://citeseer.nj.nec.com/garay97secure.html}},
  645. }
  646. @InProceedings{PIK,
  647. author = {C. Park and K. Itoh and K. Kurosawa},
  648. title = {Efficient anonymous channel and all/nothing election scheme},
  649. booktitle = {Advances in Cryptology -- {EUROCRYPT} '93},
  650. pages = {248--259},
  651. publisher = {Springer-Verlag, LNCS 765},
  652. }
  653. @Misc{pgpfaq,
  654. key = {PGP},
  655. title = {{PGP} {FAQ}},
  656. note = {\newline \url{http://www.faqs.org/faqs/pgp-faq/}},
  657. }
  658. @Article{riordan-schneier,
  659. author = {James Riordan and Bruce Schneier},
  660. title = {A Certified E-mail Protocol with No Trusted Third Party},
  661. journal = {13th Annual Computer Security Applications Conference},
  662. month = {December},
  663. year = {1998},
  664. note = {\newline \url{http://www.counterpane.com/certified-email.html}},
  665. }
  666. @Article{crowds-tissec,
  667. author = {Michael K. Reiter and Aviel D. Rubin},
  668. title = {Crowds: Anonymity for Web Transactions},
  669. journal = {ACM TISSEC},
  670. year = 1998,
  671. volume = 1,
  672. number = 1,
  673. pages = {66--92},
  674. month = {November},
  675. note = {\url{http://citeseer.nj.nec.com/284739.html}}
  676. }
  677. @Article{crowds-dimacs,
  678. author = {Michael K. Reiter and Aviel D. Rubin},
  679. title = {Crowds: Anonymity for Web Transactions},
  680. journal = {{DIMACS} Technical Report (Revised)},
  681. volume = {97},
  682. number = {15},
  683. month = {August},
  684. year = {1997},
  685. }
  686. @Misc{advogato,
  687. author = {Raph Levien},
  688. title = {Advogato's Trust Metric},
  689. note = {\newline \url{http://www.advogato.org/trust-metric.html}},
  690. }
  691. @InProceedings{publius,
  692. author = {Marc Waldman and Aviel Rubin and Lorrie Cranor},
  693. title = {Publius: {A} robust, tamper-evident, censorship-resistant and
  694. source-anonymous web publishing system},
  695. booktitle = {Proc. 9th USENIX Security Symposium},
  696. pages = {59--72},
  697. year = {2000},
  698. month = {August},
  699. note = {\newline \url{http://citeseer.nj.nec.com/waldman00publius.html}},
  700. }
  701. @Misc{freedom-nyms,
  702. author = {Russell Samuels},
  703. title = {Untraceable Nym Creation on the {F}reedom {N}etwork},
  704. year = {1999},
  705. month = {November},
  706. day = {21},
  707. note = {\newline \url{http://www.freedom.net/products/whitepapers/white11.html}},
  708. }
  709. @techreport{freedom2-arch,
  710. title = {Freedom Systems 2.0 Architecture},
  711. author = {Philippe Boucher and Adam Shostack and Ian Goldberg},
  712. institution = {Zero Knowledge Systems, {Inc.}},
  713. year = {2000},
  714. month = {December},
  715. type = {White Paper},
  716. day = {18},
  717. }
  718. @techreport{freedom21-security,
  719. title = {Freedom Systems 2.1 Security Issues and Analysis},
  720. author = {Adam Back and Ian Goldberg and Adam Shostack},
  721. institution = {Zero Knowledge Systems, {Inc.}},
  722. year = {2001},
  723. month = {May},
  724. type = {White Paper},
  725. }
  726. @inproceedings{cfs:sosp01,
  727. title = {Wide-area cooperative storage with {CFS}},
  728. author = {Frank Dabek and M. Frans Kaashoek and David Karger and Robert Morris and Ion Stoica},
  729. booktitle = {Proceedings of the 18th {ACM} {S}ymposium on {O}perating {S}ystems {P}rinciples ({SOSP} '01)},
  730. year = {2001},
  731. month = {October},
  732. address = {Chateau Lake Louise, Banff, Canada},
  733. }
  734. @inproceedings{SS03,
  735. title = {Passive Attack Analysis for Connection-Based Anonymity Systems},
  736. author = {Andrei Serjantov and Peter Sewell},
  737. booktitle = {Computer Security -- ESORICS 2003},
  738. publisher = {Springer-Verlag, LNCS (forthcoming)},
  739. year = {2003},
  740. month = {October},
  741. note = {\url{http://www.cl.cam.ac.uk/users/aas23/papers_aas/conn_sys.ps}},
  742. }
  743. @Article{raghavan87randomized,
  744. author = {P. Raghavan and C. Thompson},
  745. title = {Randomized rounding: A technique for provably good algorithms and algorithmic proofs},
  746. journal = {Combinatorica},
  747. volume = {7},
  748. pages = {365--374},
  749. year = {1987},
  750. }
  751. @InProceedings{leighton91fast,
  752. author = {Frank Thomson Leighton and Fillia Makedon and Serge A. Plotkin and
  753. Clifford Stein and Eva Tardos and Spyros Tragoudas},
  754. title = {Fast Approximation Algorithms for Multicommodity Flow Problems},
  755. booktitle = {{ACM} Symposium on Theory of Computing},
  756. pages = {101-111},
  757. year = {1991},
  758. note = {\newline \url{http://citeseer.nj.nec.com/91073.html}},
  759. }
  760. @Misc{pk-relations,
  761. author = {M. Bellare and A. Desai and D. Pointcheval and P. Rogaway},
  762. title = {Relations Among Notions of Security for Public-Key Encryption
  763. Schemes},
  764. howpublished = {
  765. Extended abstract in {\em Advances in Cryptology - CRYPTO '98}, LNCS Vol. 1462.
  766. Springer-Verlag, 1998.
  767. Full version available from \newline \url{http://www-cse.ucsd.edu/users/mihir/}},
  768. }
  769. @InProceedings{mix-acc,
  770. author = {Roger Dingledine and Michael J. Freedman and David
  771. Hopwood and David Molnar},
  772. title = {{A Reputation System to Increase MIX-net
  773. Reliability}},
  774. booktitle = {Information Hiding (IH 2001)},
  775. pages = {126--141},
  776. year = 2001,
  777. editor = {Ira S. Moskowitz},
  778. publisher = {Springer-Verlag, LNCS 2137},
  779. note = {\url{http://www.freehaven.net/papers.html}},
  780. }
  781. @InProceedings{casc-rep,
  782. author = {Roger Dingledine and Paul Syverson},
  783. title = {{Reliable MIX Cascade Networks through Reputation}},
  784. booktitle = {Financial Cryptography (FC '02)},
  785. year = 2002,
  786. editor = {Matt Blaze},
  787. publisher = {Springer-Verlag, LNCS 2357},
  788. note = {\newline \url{http://www.freehaven.net/papers.html}},
  789. }
  790. @InProceedings{zhou96certified,
  791. author = {Zhou and Gollmann},
  792. title = {Certified Electronic Mail},
  793. booktitle = {{ESORICS: European Symposium on Research in Computer
  794. Security}},
  795. publisher = {Springer-Verlag, LNCS 1146},
  796. year = {1996},
  797. note = {\newline \url{http://citeseer.nj.nec.com/zhou96certified.html}},
  798. }
  799. @Misc{realtime-mix,
  800. author = {Anja Jerichow and Jan M\"uller and Andreas Pfitzmann and
  801. Birgit Pfitzmann and Michael Waidner},
  802. title = {{Real-Time MIXes: A Bandwidth-Efficient Anonymity Protocol}},
  803. howpublished = {IEEE Journal on Selected Areas in Communications, 1998.},
  804. note = {\url{http://www.zurich.ibm.com/security/publications/1998.html}},
  805. }
  806. @InProceedings{BEAR-LIONESS,
  807. author = {Ross Anderson and Eli Biham},
  808. title = {Two Practical and Provably Secure Block Ciphers: {BEAR} and {LION}},
  809. booktitle = {International Workshop on Fast Software Encryption},
  810. year = {1996},
  811. publisher = {Springer-Verlag},
  812. note = {\url{http://citeseer.nj.nec.com/anderson96two.html}},
  813. }
  814. @Misc{SPC,
  815. author = {Daniel Bleichenbacher and Anand Desai},
  816. title = {A Construction of a Super-Pseudorandom Cipher},
  817. howpublished = {Manuscript},
  818. }
  819. @InProceedings{danezis-pets03,
  820. author = {George Danezis},
  821. title = {Mix-networks with Restricted Routes},
  822. booktitle = {Privacy Enhancing Technologies (PET 2003)},
  823. year = 2003,
  824. editor = {Roger Dingledine},
  825. publisher = {Springer-Verlag LNCS 2760}
  826. }
  827. @InProceedings{gap-pets03,
  828. author = {Krista Bennett and Christian Grothoff},
  829. title = {{GAP} -- practical anonymous networking},
  830. booktitle = {Privacy Enhancing Technologies (PET 2003)},
  831. year = 2003,
  832. editor = {Roger Dingledine},
  833. publisher = {Springer-Verlag LNCS 2760}
  834. }
  835. @Article{hordes-jcs,
  836. author = {Brian Neal Levine and Clay Shields},
  837. title = {Hordes: A Multicast-Based Protocol for Anonymity},
  838. journal = {Journal of Computer Security},
  839. year = 2002,
  840. volume = 10,
  841. number = 3,
  842. pages = {213--240}
  843. }
  844. @TechReport{herbivore,
  845. author = {Sharad Goel and Mark Robson and Milo Polte and Emin G\"{u}n Sirer},
  846. title = {Herbivore: A Scalable and Efficient Protocol for Anonymous Communication},
  847. institution = {Cornell University Computing and Information Science},
  848. year = 2003,
  849. type = {Technical Report},
  850. number = {TR2003-1890},
  851. month = {February}
  852. }
  853. @InProceedings{p5,
  854. author = {Rob Sherwood and Bobby Bhattacharjee and Aravind Srinivasan},
  855. title = {$P^5$: A Protocol for Scalable Anonymous Communication},
  856. booktitle = {2002 IEEE Symposium on Security and Privacy},
  857. pages = {58--70},
  858. year = 2002,
  859. publisher = {IEEE CS}
  860. }
  861. @phdthesis{ian-thesis,
  862. title = {A Pseudonymous Communications Infrastructure for the Internet},
  863. author = {Ian Goldberg},
  864. school = {UC Berkeley},
  865. year = {2000},
  866. month = {December},
  867. }
  868. @Article{taz,
  869. author = {Ian Goldberg and David Wagner},
  870. title = {TAZ Servers and the Rewebber Network: Enabling
  871. Anonymous Publishing on the World Wide Web},
  872. journal = {First Monday},
  873. year = 1998,
  874. volume = 3,
  875. number = 4,
  876. month = {August},
  877. note = {\url{http://www.firstmonday.dk/issues/issue3_4/goldberg/}}
  878. }
  879. @Misc{tcp-over-tcp-is-bad,
  880. key = {tcp-over-tcp-is-bad},
  881. title = {Why TCP Over TCP Is A Bad Idea},
  882. author = {Olaf Titz},
  883. note = {\url{http://sites.inka.de/sites/bigred/devel/tcp-tcp.html}}
  884. }
  885. @inproceedings{wright02,
  886. title = {An Analysis of the Degradation of Anonymous Protocols},
  887. author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields},
  888. booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '02},
  889. year = {2002},
  890. month = {February},
  891. publisher = {IEEE},
  892. }
  893. @inproceedings{wright03,
  894. title = {Defending Anonymous Communication Against Passive Logging Attacks},
  895. author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields},
  896. booktitle = {2003 IEEE Symposium on Security and Privacy},
  897. pages= {28--41},
  898. year = {2003},
  899. month = {May},
  900. publisher = {IEEE CS},
  901. }
  902. %%% Local Variables:
  903. %%% mode: latex
  904. %%% TeX-master: "tor-design"
  905. %%% End: