tor-design.bib 34 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014
  1. @inproceedings{tarzan:ccs02,
  2. title = {Tarzan: A Peer-to-Peer Anonymizing Network Layer},
  3. author = {Michael J. Freedman and Robert Morris},
  4. booktitle = {Proceedings of the 9th {ACM} {C}onference on {C}omputer and {C}ommunications
  5. {S}ecurity ({CCS 2002})},
  6. year = {2002},
  7. month = {November},
  8. address = {Washington, DC},
  9. }
  10. @inproceedings{cebolla,
  11. title = {{Cebolla: Pragmatic IP Anonymity}},
  12. author = {Zach Brown},
  13. booktitle = {Proceedings of the 2002 Ottawa Linux Symposium},
  14. year = {2002},
  15. month = {June},
  16. }
  17. @misc{eax,
  18. author = "M. Bellare and P. Rogaway and D. Wagner",
  19. title = "A conventional authenticated-encryption mode",
  20. text = "M. Bellare, P. Rogaway, and D. Wagner. A conventional authenticated-encryption
  21. mode. Manuscript, April 2003. www.cs.ucdavis.edu/\~{}rogaway",
  22. month = {April},
  23. year = {2003},
  24. }
  25. @misc{darkside,
  26. title = {{The Dark Side of the Web: An Open Proxy's View}},
  27. author = {Vivek S. Pai and Limin Wang and KyoungSoo Park and Ruoming Pang and Larry Peterson},
  28. note = {Submitted to HotNets-II. \url{http://codeen.cs.princeton.edu/}},
  29. }
  30. @Misc{anonymizer,
  31. key = {anonymizer},
  32. title = {The {Anonymizer}},
  33. note = {\url{http://www.anonymizer.com/}}
  34. }
  35. @Misc{privoxy,
  36. key = {privoxy},
  37. title = {{Privoxy}},
  38. note = {\url{http://www.privoxy.org/}}
  39. }
  40. @Misc{anonnet,
  41. key = {anonnet},
  42. title = {{AnonNet}},
  43. note = {\url{http://www.authnet.org/anonnet/}}
  44. }
  45. % can somebody track down the rest of this? -RD
  46. @Misc{castro-liskov,
  47. author = {Miguel Castro and Barbara Liskov},
  48. title = {Proactive Recovery in a Byzantine-Fault-Tolerant System},
  49. howpublished = {
  50. $<$http://www.pmg.lcs.mit.edu/$\tilde{\hspace{5pt}}$castro/application/recovery.pdf$>$},
  51. }
  52. @inproceedings{econymics,
  53. title = {On the Economics of Anonymity},
  54. author = {Alessandro Acquisti and Roger Dingledine and Paul Syverson},
  55. booktitle = {Financial Cryptography, FC 2003},
  56. year = {2003},
  57. editor = {Rebecca N. Wright},
  58. publisher = {Springer-Verlag, LNCS 2742},
  59. note = {\url{http://freehaven.net/doc/fc03/econymics.pdf}},
  60. }
  61. @inproceedings{defensive-dropping,
  62. title = {Stopping Timing Attacks in Low-Latency Mix-Based Systems},
  63. author = {Matthew Wright and Brian N. Levine and Michael K. Reiter and Chenxi Wang},
  64. booktitle = {Financial Cryptography, FC 2004},
  65. year = {2004},
  66. editor = {Ari Juels},
  67. publisher = {Springer-Verlag, LNCS (forthcoming)},
  68. }
  69. @inproceedings{morphmix:fc04,
  70. title = {Practical Anonymity for the Masses with MorphMix},
  71. author = {Marc Rennhard and Bernhard Plattner},
  72. booktitle = {Financial Cryptography, FC 2004},
  73. year = {2004},
  74. editor = {Ari Juels},
  75. publisher = {Springer-Verlag, LNCS (forthcoming)},
  76. }
  77. @inproceedings{eternity,
  78. title = {The Eternity Service},
  79. author = {Ross Anderson},
  80. booktitle = {Proceedings of Pragocrypt '96},
  81. year = {1996},
  82. note = {\url{http://www.cl.cam.ac.uk/users/rja14/eternity/eternity.html}},
  83. }
  84. @inproceedings{minion-design,
  85. title = {Mixminion: Design of a Type {III} Anonymous Remailer Protocol},
  86. author = {George Danezis and Roger Dingledine and Nick Mathewson},
  87. booktitle = {2003 IEEE Symposium on Security and Privacy},
  88. year = {2003},
  89. month = {May},
  90. publisher = {IEEE CS},
  91. pages = {2--15},
  92. note = {\url{http://mixminion.net/minion-design.pdf}},
  93. www_important = {1},
  94. www_section = {Anonymous communication},
  95. }
  96. @inproceedings{ rao-pseudonymity,
  97. author = "Josyula R. Rao and Pankaj Rohatgi",
  98. title = "Can Pseudonymity Really Guarantee Privacy?",
  99. booktitle = "Proceedings of the Ninth USENIX Security Symposium",
  100. year = {2000},
  101. month = Aug,
  102. publisher = {USENIX},
  103. pages = "85--96",
  104. note = {\url{http://www.usenix.org/publications/library/proceedings/sec2000/
  105. full_papers/rao/rao.pdf}},
  106. }
  107. @InProceedings{pfitzmann90how,
  108. author = "Birgit Pfitzmann and Andreas Pfitzmann",
  109. title = "How to Break the Direct {RSA}-Implementation of {MIXes}",
  110. booktitle = {Eurocrypt 89},
  111. publisher = {Springer-Verlag, LNCS 434},
  112. year = {1990},
  113. note = {\url{http://citeseer.nj.nec.com/pfitzmann90how.html}},
  114. }
  115. % author = {Roger Dingledine and Nick Mathewson},
  116. @Misc{tor-spec,
  117. author = {Anonymized},
  118. title = {Tor Protocol Specifications},
  119. note = {\url{http://freehaven.net/tor/tor-spec.txt}},
  120. }
  121. @InProceedings{BM:mixencrypt,
  122. author = {M{\"o}ller, Bodo},
  123. title = {Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes},
  124. booktitle = {{CT-RSA} 2003},
  125. publisher = {Springer-Verlag, LNCS 2612},
  126. year = 2003,
  127. }
  128. % Would a more recent reference for SPRPs be more useful?
  129. @Article{sprp,
  130. author = {Michael Luby and Charles Rackoff},
  131. title = {How to Construct Pseudorandom Permutations from
  132. Pseudorandom Functions},
  133. journal = {SIAM Journal on Computing},
  134. year = {1988},
  135. volume = {17},
  136. number = {2},
  137. pages = {373--386},
  138. }
  139. @InProceedings{back01,
  140. author = {Adam Back and Ulf M\"oller and Anton Stiglic},
  141. title = {Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems},
  142. booktitle = {Information Hiding (IH 2001)},
  143. pages = {245--257},
  144. year = 2001,
  145. editor = {Ira S. Moskowitz},
  146. publisher = {Springer-Verlag, LNCS 2137},
  147. note = {\newline \url{http://www.cypherspace.org/adam/pubs/traffic.pdf}},
  148. }
  149. @InProceedings{rackoff93cryptographic,
  150. author = {Charles Rackoff and Daniel R. Simon},
  151. title = {Cryptographic Defense Against Traffic Analysis},
  152. booktitle = {{ACM} Symposium on Theory of Computing},
  153. pages = {672--681},
  154. year = {1993},
  155. note = {\url{http://research.microsoft.com/crypto/dansimon/me.htm}},
  156. }
  157. @InProceedings{freehaven-berk,
  158. author = {Roger Dingledine and Michael J. Freedman and David Molnar},
  159. title = {The Free Haven Project: Distributed Anonymous Storage Service},
  160. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  161. on Design Issue in Anonymity and Unobservability},
  162. year = {2000},
  163. month = {July},
  164. editor = {H. Federrath},
  165. publisher = {Springer-Verlag, LNCS 2009},
  166. note = {\url{http://freehaven.net/papers.html}},
  167. }
  168. @InProceedings{raymond00,
  169. author = {J. F. Raymond},
  170. title = {{Traffic Analysis: Protocols, Attacks, Design Issues,
  171. and Open Problems}},
  172. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  173. on Design Issue in Anonymity and Unobservability},
  174. year = 2000,
  175. month = {July},
  176. pages = {10-29},
  177. editor = {H. Federrath},
  178. publisher = {Springer-Verlag, LNCS 2009},
  179. }
  180. @InProceedings{trickle02,
  181. author = {Andrei Serjantov and Roger Dingledine and Paul Syverson},
  182. title = {From a Trickle to a Flood: Active Attacks on Several
  183. Mix Types},
  184. booktitle = {Information Hiding (IH 2002)},
  185. year = {2002},
  186. editor = {Fabien Petitcolas},
  187. publisher = {Springer-Verlag, LNCS 2578},
  188. }
  189. @InProceedings{langos02,
  190. author = {Oliver Berthold and Heinrich Langos},
  191. title = {Dummy Traffic Against Long Term Intersection Attacks},
  192. booktitle = {Privacy Enhancing Technologies (PET 2002)},
  193. year = {2002},
  194. editor = {Roger Dingledine and Paul Syverson},
  195. publisher = {Springer-Verlag, LNCS 2482}
  196. }
  197. @InProceedings{or-discex00,
  198. author = {Paul Syverson and Michael Reed and David Goldschlag},
  199. title = {{O}nion {R}outing Access Configurations},
  200. booktitle = {DARPA Information Survivability Conference and
  201. Exposition (DISCEX 2000)},
  202. year = {2000},
  203. publisher = {IEEE CS Press},
  204. pages = {34--40},
  205. volume = {1},
  206. note = {\newline \url{http://www.onion-router.net/Publications.html}},
  207. }
  208. @Inproceedings{or-pet00,
  209. title = {{Towards an Analysis of Onion Routing Security}},
  210. author = {Paul Syverson and Gene Tsudik and Michael Reed and
  211. Carl Landwehr},
  212. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  213. on Design Issue in Anonymity and Unobservability},
  214. year = 2000,
  215. month = {July},
  216. pages = {96--114},
  217. editor = {H. Federrath},
  218. publisher = {Springer-Verlag, LNCS 2009},
  219. note = {\url{http://www.onion-router.net/Publications/WDIAU-2000.ps.gz}},
  220. }
  221. @Inproceedings{freenet-pets00,
  222. title = {Freenet: A Distributed Anonymous Information Storage
  223. and Retrieval System},
  224. author = {Ian Clarke and Oskar Sandberg and Brandon Wiley and
  225. Theodore W. Hong},
  226. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  227. on Design Issue in Anonymity and Unobservability},
  228. year = 2000,
  229. month = {July},
  230. pages = {46--66},
  231. editor = {H. Federrath},
  232. publisher = {Springer-Verlag, LNCS 2009},
  233. note = {\url{http://citeseer.nj.nec.com/clarke00freenet.html}},
  234. }
  235. @InProceedings{or-ih96,
  236. author = {David M. Goldschlag and Michael G. Reed and Paul
  237. F. Syverson},
  238. title = {Hiding Routing Information},
  239. booktitle = {Information Hiding, First International Workshop},
  240. pages = {137--150},
  241. year = 1996,
  242. editor = {R. Anderson},
  243. month = {May},
  244. publisher = {Springer-Verlag, LNCS 1174},
  245. note = {\url{http://www.onion-router.net/Publications/IH-1996.ps.gz}}
  246. }
  247. @Article{or-jsac98,
  248. author = {Michael G. Reed and Paul F. Syverson and David
  249. M. Goldschlag},
  250. title = {Anonymous Connections and Onion Routing},
  251. journal = {IEEE Journal on Selected Areas in Communications},
  252. year = 1998,
  253. volume = 16,
  254. number = 4,
  255. pages = {482--494},
  256. month = {May},
  257. note = {\url{http://www.onion-router.net/Publications/JSAC-1998.ps.gz}}
  258. }
  259. @Misc{TLS,
  260. author = {T. Dierks and C. Allen},
  261. title = {The {TLS} {P}rotocol --- {V}ersion 1.0},
  262. howpublished = {IETF RFC 2246},
  263. month = {January},
  264. year = {1999},
  265. note = {\url{http://www.rfc-editor.org/rfc/rfc2246.txt}},
  266. }
  267. @Misc{SMTP,
  268. author = {J. Postel},
  269. title = {Simple {M}ail {T}ransfer {P}rotocol},
  270. howpublished = {IETF RFC 2821 (also STD0010)},
  271. month = {April},
  272. year = {2001},
  273. note = {\url{http://www.rfc-editor.org/rfc/rfc2821.txt}},
  274. }
  275. @Misc{IMAP,
  276. author = {M. Crispin},
  277. title = {Internet {M}essage {A}ccess {P}rotocol --- {V}ersion 4rev1},
  278. howpublished = {IETF RFC 2060},
  279. month = {December},
  280. year = {1996},
  281. note = {\url{http://www.rfc-editor.org/rfc/rfc2060.txt}},
  282. }
  283. @misc{pipenet,
  284. title = {PipeNet 1.1},
  285. author = {Wei Dai},
  286. year = 1996,
  287. month = {August},
  288. howpublished = {Usenet post},
  289. note = {\url{http://www.eskimo.com/~weidai/pipenet.txt} First mentioned
  290. in a post to the cypherpunks list, Feb.\ 1995.},
  291. }
  292. @Misc{POP3,
  293. author = {J. Myers and M. Rose},
  294. title = {Post {O}ffice {P}rotocol --- {V}ersion 3},
  295. howpublished = {IETF RFC 1939 (also STD0053)},
  296. month = {May},
  297. year = {1996},
  298. note = {\url{http://www.rfc-editor.org/rfc/rfc1939.txt}},
  299. }
  300. @InProceedings{shuffle,
  301. author = {C. Andrew Neff},
  302. title = {A Verifiable Secret Shuffle and its Application to E-Voting},
  303. booktitle = {8th ACM Conference on Computer and Communications
  304. Security (CCS-8)},
  305. pages = {116--125},
  306. year = 2001,
  307. editor = {P. Samarati},
  308. month = {November},
  309. publisher = {ACM Press},
  310. note = {\url{http://www.votehere.net/ada_compliant/ourtechnology/
  311. technicaldocs/shuffle.pdf}},
  312. }
  313. @InProceedings{dolev91,
  314. author = {Danny Dolev and Cynthia Dwork and Moni Naor},
  315. title = {Non-Malleable Cryptography},
  316. booktitle = {23rd ACM Symposium on the Theory of Computing (STOC)},
  317. pages = {542--552},
  318. year = 1991,
  319. note = {Updated version at
  320. \url{http://citeseer.nj.nec.com/dolev00nonmalleable.html}},
  321. }
  322. @TechReport{rsw96,
  323. author = {Ronald L. Rivest and Adi Shamir and David A. Wagner},
  324. title = {Time-lock puzzles and timed-release Crypto},
  325. year = 1996,
  326. type = {MIT LCS technical memo},
  327. number = {MIT/LCS/TR-684},
  328. month = {February},
  329. note = {\newline \url{http://citeseer.nj.nec.com/rivest96timelock.html}},
  330. }
  331. @InProceedings{web-mix,
  332. author = {Oliver Berthold and Hannes Federrath and Stefan K\"opsell},
  333. title = {Web {MIX}es: A system for anonymous and unobservable
  334. {I}nternet access},
  335. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  336. on Design Issue in Anonymity and Unobservability},
  337. editor = {H. Federrath},
  338. publisher = {Springer-Verlag, LNCS 2009},
  339. pages = {115--129},
  340. year = 2000,
  341. }
  342. @InProceedings{disad-free-routes,
  343. author = {Oliver Berthold and Andreas Pfitzmann and Ronny Standtke},
  344. title = {The disadvantages of free {MIX} routes and how to overcome
  345. them},
  346. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  347. on Design Issue in Anonymity and Unobservability},
  348. pages = {30--45},
  349. year = 2000,
  350. editor = {H. Federrath},
  351. publisher = {Springer-Verlag, LNCS 2009},
  352. note = {\url{http://www.tik.ee.ethz.ch/~weiler/lehre/netsec/Unterlagen/anon/
  353. disadvantages_berthold.pdf}},
  354. }
  355. @InProceedings{boneh00,
  356. author = {Dan Boneh and Moni Naor},
  357. title = {Timed Commitments},
  358. booktitle = {Advances in Cryptology -- {CRYPTO} 2000},
  359. pages = {236--254},
  360. year = 2000,
  361. publisher = {Springer-Verlag, LNCS 1880},
  362. note = {\newline \url{http://crypto.stanford.edu/~dabo/abstracts/timedcommit.html}},
  363. }
  364. @InProceedings{goldschlag98,
  365. author = {David M. Goldschlag and Stuart G. Stubblebine},
  366. title = {Publicly Verifiable Lotteries: Applications of
  367. Delaying Functions},
  368. booktitle = {Financial Cryptography, FC'98},
  369. pages = {214--226},
  370. year = 1998,
  371. publisher = {Springer-Verlag, LNCS 1465},
  372. note = {\newline \url{http://citeseer.nj.nec.com/goldschlag98publicly.html}},
  373. }
  374. @InProceedings{syverson98,
  375. author = {Paul Syverson},
  376. title = {Weakly Secret Bit Commitment: Applications to
  377. Lotteries and Fair Exchange},
  378. booktitle = {Computer Security Foundations Workshop (CSFW11)},
  379. pages = {2--13},
  380. year = 1998,
  381. address = {Rockport Massachusetts},
  382. month = {June},
  383. publisher = {IEEE CS Press},
  384. note = {\newline \url{http://chacs.nrl.navy.mil/publications/CHACS/1998/}},
  385. }
  386. @Misc{shoup-iso,
  387. author = {Victor Shoup},
  388. title = {A Proposal for an {ISO} {S}tandard for Public Key Encryption (version 2.1)},
  389. note = {Revised December 20, 2001. \url{http://www.shoup.net/papers/}},
  390. }
  391. @Misc{shoup-oaep,
  392. author = {Victor Shoup},
  393. title = {{OAEP} Reconsidered},
  394. howpublished = {{IACR} e-print 2000/060},
  395. note = {\newline \url{http://eprint.iacr.org/2000/060/}},
  396. }
  397. @Misc{oaep-still-alive,
  398. author = {E. Fujisaki and D. Pointcheval and T. Okamoto and J. Stern},
  399. title = {{RSA}-{OAEP} is Still Alive!},
  400. howpublished = {{IACR} e-print 2000/061},
  401. note = {\newline \url{http://eprint.iacr.org/2000/061/}},
  402. }
  403. @misc{echolot,
  404. author = {Peter Palfrader},
  405. title = {Echolot: a pinger for anonymous remailers},
  406. note = {\url{http://www.palfrader.org/echolot/}},
  407. }
  408. @Misc{mixmaster-attacks,
  409. author = {Lance Cottrell},
  410. title = {Mixmaster and Remailer Attacks},
  411. note = {\url{http://www.obscura.com/~loki/remailer/remailer-essay.html}},
  412. }
  413. @Misc{mixmaster-spec,
  414. author = {Ulf M{\"o}ller and Lance Cottrell and Peter
  415. Palfrader and Len Sassaman},
  416. title = {Mixmaster {P}rotocol --- {V}ersion 2},
  417. year = {2003},
  418. month = {July},
  419. howpublished = {Draft},
  420. note = {\url{http://www.abditum.com/mixmaster-spec.txt}},
  421. }
  422. @Article{mitzenm-loss,
  423. author = {G. Louth and M. Mitzenmacher and F.P. Kelly},
  424. title = {Computational Complexity of Loss Networks},
  425. journal = {Theoretical Computer Science},
  426. year = {1994},
  427. volume = {125},
  428. pages = {45-59},
  429. note = {\newline \url{http://citeseer.nj.nec.com/louth94computational.html}},
  430. }
  431. @Misc{hashcash,
  432. author = {Adam Back},
  433. title = {Hash cash},
  434. note = {\newline \url{http://www.cypherspace.org/~adam/hashcash/}},
  435. }
  436. @InProceedings{oreilly-acc,
  437. author = {Roger Dingledine and Michael J. Freedman and David Molnar},
  438. title = {Accountability},
  439. booktitle = {Peer-to-peer: Harnessing the Benefits of a Disruptive
  440. Technology},
  441. year = {2001},
  442. publisher = {O'Reilly and Associates},
  443. }
  444. @InProceedings{han,
  445. author = {Yongfei Han},
  446. title = {Investigation of non-repudiation protocols},
  447. booktitle = {ACISP '96},
  448. year = 1996,
  449. publisher = {Springer-Verlag},
  450. }
  451. @Misc{socks5,
  452. key = {socks5},
  453. title = {{SOCKS} {P}rotocol {V}ersion 5},
  454. howpublished= {IETF RFC 1928},
  455. month = {March},
  456. year = 1996,
  457. note = {\url{http://www.ietf.org/rfc/rfc1928.txt}}
  458. }
  459. @InProceedings{abe,
  460. author = {Masayuki Abe},
  461. title = {Universally Verifiable {MIX} With Verification Work Independent of
  462. The Number of {MIX} Servers},
  463. booktitle = {{EUROCRYPT} 1998},
  464. year = {1998},
  465. publisher = {Springer-Verlag, LNCS 1403},
  466. }
  467. @InProceedings{desmedt,
  468. author = {Yvo Desmedt and Kaoru Kurosawa},
  469. title = {How To Break a Practical {MIX} and Design a New One},
  470. booktitle = {{EUROCRYPT} 2000},
  471. year = {2000},
  472. publisher = {Springer-Verlag, LNCS 1803},
  473. note = {\url{http://citeseer.nj.nec.com/447709.html}},
  474. }
  475. @InProceedings{mitkuro,
  476. author = {M. Mitomo and K. Kurosawa},
  477. title = {{Attack for Flash MIX}},
  478. booktitle = {{ASIACRYPT} 2000},
  479. year = {2000},
  480. publisher = {Springer-Verlag, LNCS 1976},
  481. note = {\newline \url{http://citeseer.nj.nec.com/450148.html}},
  482. }
  483. @InProceedings{hybrid-mix,
  484. author = {M. Ohkubo and M. Abe},
  485. title = {A {L}ength-{I}nvariant {H}ybrid {MIX}},
  486. booktitle = {Advances in Cryptology - {ASIACRYPT} 2000},
  487. year = {2000},
  488. publisher = {Springer-Verlag, LNCS 1976},
  489. }
  490. @InProceedings{PShuffle,
  491. author = {Jun Furukawa and Kazue Sako},
  492. title = {An Efficient Scheme for Proving a Shuffle},
  493. editor = {Joe Kilian},
  494. booktitle = {CRYPTO 2001},
  495. year = {2001},
  496. publisher = {Springer-Verlag, LNCS 2139},
  497. }
  498. @InProceedings{jakobsson-optimally,
  499. author = "Markus Jakobsson and Ari Juels",
  500. title = "An Optimally Robust Hybrid Mix Network (Extended Abstract)",
  501. booktitle = {Principles of Distributed Computing - {PODC} '01},
  502. year = "2001",
  503. publisher = {ACM Press},
  504. note = {\url{http://citeseer.nj.nec.com/492015.html}},
  505. }
  506. @InProceedings{kesdogan,
  507. author = {D. Kesdogan and M. Egner and T. B\"uschkes},
  508. title = {Stop-and-Go {MIX}es Providing Probabilistic Anonymity in an Open
  509. System},
  510. booktitle = {Information Hiding (IH 1998)},
  511. year = {1998},
  512. publisher = {Springer-Verlag, LNCS 1525},
  513. note = {\url{http://www.cl.cam.ac.uk/~fapp2/ihw98/ihw98-sgmix.pdf}},
  514. }
  515. @InProceedings{socks4,
  516. author = {David Koblas and Michelle R. Koblas},
  517. title = {{SOCKS}},
  518. booktitle = {UNIX Security III Symposium (1992 USENIX Security
  519. Symposium)},
  520. pages = {77--83},
  521. year = 1992,
  522. publisher = {USENIX},
  523. }
  524. @InProceedings{flash-mix,
  525. author = {Markus Jakobsson},
  526. title = {Flash {M}ixing},
  527. booktitle = {Principles of Distributed Computing - {PODC} '99},
  528. year = {1999},
  529. publisher = {ACM Press},
  530. note = {\newline \url{http://citeseer.nj.nec.com/jakobsson99flash.html}},
  531. }
  532. @InProceedings{SK,
  533. author = {Joe Kilian and Kazue Sako},
  534. title = {Receipt-Free {MIX}-Type Voting Scheme - A Practical Solution to
  535. the Implementation of a Voting Booth},
  536. booktitle = {EUROCRYPT '95},
  537. year = {1995},
  538. publisher = {Springer-Verlag},
  539. }
  540. @InProceedings{OAEP,
  541. author = {M. Bellare and P. Rogaway},
  542. year = {1994},
  543. booktitle = {EUROCRYPT '94},
  544. title = {Optimal {A}symmetric {E}ncryption {P}adding : How To Encrypt With
  545. {RSA}},
  546. publisher = {Springer-Verlag},
  547. note = {\newline \url{http://www-cse.ucsd.edu/users/mihir/papers/oaep.html}},
  548. }
  549. @inproceedings{babel,
  550. title = {Mixing {E}-mail With {B}abel},
  551. author = {Ceki G\"ulc\"u and Gene Tsudik},
  552. booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '96},
  553. year = 1996,
  554. month = {February},
  555. pages = {2--16},
  556. publisher = {IEEE},
  557. www_important = 1,
  558. note = {\url{http://citeseer.nj.nec.com/2254.html}},
  559. www_section = {Anonymous communication},
  560. }
  561. @InProceedings{freenet,
  562. author = {Ian Clarke and Oskar Sandberg and Brandon Wiley and Theodore W. Hong},
  563. title = {Freenet: {A} Distributed Anonymous Information Storage and Retrieval
  564. System},
  565. booktitle = {Workshop on Design Issues in Anonymity and Unobservability},
  566. pages = {46--66},
  567. year = {2000},
  568. note = {\newline \url{http://citeseer.nj.nec.com/clarke00freenet.html}},
  569. }
  570. @Misc{rprocess,
  571. author = {RProcess},
  572. title = {Selective Denial of Service Attacks},
  573. note = {\newline \url{http://www.eff.org/pub/Privacy/Anonymity/1999\_09\_DoS\_remail\_vuln.html}},
  574. }
  575. @Article{remailer-history,
  576. author = {Sameer Parekh},
  577. title = {Prospects for Remailers},
  578. journal = {First Monday},
  579. volume = {1},
  580. number = {2},
  581. month = {August},
  582. year = {1996},
  583. note = {\url{http://www.firstmonday.dk/issues/issue2/remailers/}},
  584. }
  585. @Article{chaum-mix,
  586. author = {David Chaum},
  587. title = {Untraceable electronic mail, return addresses, and digital pseudo-nyms},
  588. journal = {Communications of the ACM},
  589. year = {1981},
  590. volume = {4},
  591. number = {2},
  592. month = {February},
  593. note = {\url{http://www.eskimo.com/~weidai/mix-net.txt}},
  594. }
  595. @InProceedings{nym-alias-net,
  596. author = {David Mazi\`{e}res and M. Frans Kaashoek},
  597. title = {{The Design, Implementation and Operation of an Email
  598. Pseudonym Server}},
  599. booktitle = {$5^{th}$ ACM Conference on Computer and
  600. Communications Security (CCS'98)},
  601. year = 1998,
  602. publisher = {ACM Press},
  603. note = {\newline \url{http://www.scs.cs.nyu.edu/~dm/}},
  604. }
  605. @InProceedings{tangler,
  606. author = {Marc Waldman and David Mazi\`{e}res},
  607. title = {Tangler: A Censorship-Resistant Publishing System
  608. Based on Document Entanglements},
  609. booktitle = {$8^{th}$ ACM Conference on Computer and
  610. Communications Security (CCS-8)},
  611. pages = {86--135},
  612. year = 2001,
  613. publisher = {ACM Press},
  614. note = {\url{http://www.scs.cs.nyu.edu/~dm/}}
  615. }
  616. @misc{neochaum,
  617. author = {Tim May},
  618. title = {Payment mixes for anonymity},
  619. howpublished = {E-mail archived at
  620. \url{http://\newline www.inet-one.com/cypherpunks/dir.2000.02.28-2000.03.05/msg00334.html}},
  621. }
  622. @misc{helsingius,
  623. author = {J. Helsingius},
  624. title = {{\tt anon.penet.fi} press release},
  625. note = {\newline \url{http://www.penet.fi/press-english.html}},
  626. }
  627. @InProceedings{garay97secure,
  628. author = {J. Garay and R. Gennaro and C. Jutla and T. Rabin},
  629. title = {Secure distributed storage and retrieval},
  630. booktitle = {11th International Workshop, WDAG '97},
  631. pages = {275--289},
  632. year = {1997},
  633. publisher = {Springer-Verlag, LNCS 1320},
  634. note = {\newline \url{http://citeseer.nj.nec.com/garay97secure.html}},
  635. }
  636. @InProceedings{PIK,
  637. author = {C. Park and K. Itoh and K. Kurosawa},
  638. title = {Efficient anonymous channel and all/nothing election scheme},
  639. booktitle = {Advances in Cryptology -- {EUROCRYPT} '93},
  640. pages = {248--259},
  641. publisher = {Springer-Verlag, LNCS 765},
  642. }
  643. @Misc{pgpfaq,
  644. key = {PGP},
  645. title = {{PGP} {FAQ}},
  646. note = {\newline \url{http://www.faqs.org/faqs/pgp-faq/}},
  647. }
  648. @Article{riordan-schneier,
  649. author = {James Riordan and Bruce Schneier},
  650. title = {A Certified E-mail Protocol with No Trusted Third Party},
  651. journal = {13th Annual Computer Security Applications Conference},
  652. month = {December},
  653. year = {1998},
  654. note = {\newline \url{http://www.counterpane.com/certified-email.html}},
  655. }
  656. @Article{crowds-tissec,
  657. author = {Michael K. Reiter and Aviel D. Rubin},
  658. title = {Crowds: Anonymity for Web Transactions},
  659. journal = {ACM TISSEC},
  660. year = 1998,
  661. volume = 1,
  662. number = 1,
  663. pages = {66--92},
  664. month = {November},
  665. note = {\url{http://citeseer.nj.nec.com/284739.html}}
  666. }
  667. @Article{crowds-dimacs,
  668. author = {Michael K. Reiter and Aviel D. Rubin},
  669. title = {Crowds: Anonymity for Web Transactions},
  670. journal = {{DIMACS} Technical Report (Revised)},
  671. volume = {97},
  672. number = {15},
  673. month = {August},
  674. year = {1997},
  675. }
  676. @Misc{advogato,
  677. author = {Raph Levien},
  678. title = {Advogato's Trust Metric},
  679. note = {\newline \url{http://www.advogato.org/trust-metric.html}},
  680. }
  681. @InProceedings{publius,
  682. author = {Marc Waldman and Aviel Rubin and Lorrie Cranor},
  683. title = {Publius: {A} robust, tamper-evident, censorship-resistant and
  684. source-anonymous web publishing system},
  685. booktitle = {Proc. 9th USENIX Security Symposium},
  686. pages = {59--72},
  687. year = {2000},
  688. month = {August},
  689. note = {\newline \url{http://citeseer.nj.nec.com/waldman00publius.html}},
  690. }
  691. @Misc{freedom-nyms,
  692. author = {Russell Samuels},
  693. title = {Untraceable Nym Creation on the {F}reedom {N}etwork},
  694. year = {1999},
  695. month = {November},
  696. day = {21},
  697. note = {\newline \url{http://www.freedom.net/products/whitepapers/white11.html}},
  698. }
  699. @techreport{freedom2-arch,
  700. title = {Freedom Systems 2.0 Architecture},
  701. author = {Philippe Boucher and Adam Shostack and Ian Goldberg},
  702. institution = {Zero Knowledge Systems, {Inc.}},
  703. year = {2000},
  704. month = {December},
  705. type = {White Paper},
  706. day = {18},
  707. }
  708. @techreport{freedom21-security,
  709. title = {Freedom Systems 2.1 Security Issues and Analysis},
  710. author = {Adam Back and Ian Goldberg and Adam Shostack},
  711. institution = {Zero Knowledge Systems, {Inc.}},
  712. year = {2001},
  713. month = {May},
  714. type = {White Paper},
  715. }
  716. @inproceedings{cfs:sosp01,
  717. title = {Wide-area cooperative storage with {CFS}},
  718. author = {Frank Dabek and M. Frans Kaashoek and David Karger and Robert Morris and Ion Stoica},
  719. booktitle = {Proceedings of the 18th {ACM} {S}ymposium on {O}perating {S}ystems {P}rinciples ({SOSP} '01)},
  720. year = {2001},
  721. month = {October},
  722. address = {Chateau Lake Louise, Banff, Canada},
  723. }
  724. @inproceedings{SS03,
  725. title = {Passive Attack Analysis for Connection-Based Anonymity Systems},
  726. author = {Andrei Serjantov and Peter Sewell},
  727. booktitle = {Computer Security -- ESORICS 2003},
  728. publisher = {Springer-Verlag, LNCS (forthcoming)},
  729. year = {2003},
  730. month = {October},
  731. note = {\url{http://www.cl.cam.ac.uk/users/aas23/papers_aas/conn_sys.ps}},
  732. }
  733. @Article{raghavan87randomized,
  734. author = {P. Raghavan and C. Thompson},
  735. title = {Randomized rounding: A technique for provably good algorithms and algorithmic proofs},
  736. journal = {Combinatorica},
  737. volume = {7},
  738. pages = {365--374},
  739. year = {1987},
  740. }
  741. @InProceedings{leighton91fast,
  742. author = {Frank Thomson Leighton and Fillia Makedon and Serge A. Plotkin and
  743. Clifford Stein and Eva Tardos and Spyros Tragoudas},
  744. title = {Fast Approximation Algorithms for Multicommodity Flow Problems},
  745. booktitle = {{ACM} Symposium on Theory of Computing},
  746. pages = {101-111},
  747. year = {1991},
  748. note = {\newline \url{http://citeseer.nj.nec.com/91073.html}},
  749. }
  750. @Misc{pk-relations,
  751. author = {M. Bellare and A. Desai and D. Pointcheval and P. Rogaway},
  752. title = {Relations Among Notions of Security for Public-Key Encryption
  753. Schemes},
  754. howpublished = {
  755. Extended abstract in {\em Advances in Cryptology - CRYPTO '98}, LNCS Vol. 1462.
  756. Springer-Verlag, 1998.
  757. Full version available from \newline \url{http://www-cse.ucsd.edu/users/mihir/}},
  758. }
  759. @InProceedings{mix-acc,
  760. author = {Roger Dingledine and Michael J. Freedman and David
  761. Hopwood and David Molnar},
  762. title = {{A Reputation System to Increase MIX-net
  763. Reliability}},
  764. booktitle = {Information Hiding (IH 2001)},
  765. pages = {126--141},
  766. year = 2001,
  767. editor = {Ira S. Moskowitz},
  768. publisher = {Springer-Verlag, LNCS 2137},
  769. note = {\url{http://www.freehaven.net/papers.html}},
  770. }
  771. @InProceedings{casc-rep,
  772. author = {Roger Dingledine and Paul Syverson},
  773. title = {{Reliable MIX Cascade Networks through Reputation}},
  774. booktitle = {Financial Cryptography (FC '02)},
  775. year = 2002,
  776. editor = {Matt Blaze},
  777. publisher = {Springer-Verlag, LNCS 2357},
  778. note = {\newline \url{http://www.freehaven.net/papers.html}},
  779. }
  780. @InProceedings{zhou96certified,
  781. author = {Zhou and Gollmann},
  782. title = {Certified Electronic Mail},
  783. booktitle = {{ESORICS: European Symposium on Research in Computer
  784. Security}},
  785. publisher = {Springer-Verlag, LNCS 1146},
  786. year = {1996},
  787. note = {\newline \url{http://citeseer.nj.nec.com/zhou96certified.html}},
  788. }
  789. @Misc{realtime-mix,
  790. author = {Anja Jerichow and Jan M\"uller and Andreas Pfitzmann and
  791. Birgit Pfitzmann and Michael Waidner},
  792. title = {{Real-Time MIXes: A Bandwidth-Efficient Anonymity Protocol}},
  793. howpublished = {IEEE Journal on Selected Areas in Communications, 1998.},
  794. note = {\url{http://www.zurich.ibm.com/security/publications/1998.html}},
  795. }
  796. @InProceedings{BEAR-LIONESS,
  797. author = {Ross Anderson and Eli Biham},
  798. title = {Two Practical and Provably Secure Block Ciphers: {BEAR} and {LION}},
  799. booktitle = {International Workshop on Fast Software Encryption},
  800. year = {1996},
  801. publisher = {Springer-Verlag},
  802. note = {\url{http://citeseer.nj.nec.com/anderson96two.html}},
  803. }
  804. @Misc{SPC,
  805. author = {Daniel Bleichenbacher and Anand Desai},
  806. title = {A Construction of a Super-Pseudorandom Cipher},
  807. howpublished = {Manuscript},
  808. }
  809. @InProceedings{danezis-pets03,
  810. author = {George Danezis},
  811. title = {Mix-networks with Restricted Routes},
  812. booktitle = {Privacy Enhancing Technologies (PET 2003)},
  813. year = 2003,
  814. editor = {Roger Dingledine},
  815. publisher = {Springer-Verlag LNCS 2760}
  816. }
  817. @InProceedings{gap-pets03,
  818. author = {Krista Bennett and Christian Grothoff},
  819. title = {{GAP} -- practical anonymous networking},
  820. booktitle = {Privacy Enhancing Technologies (PET 2003)},
  821. year = 2003,
  822. editor = {Roger Dingledine},
  823. publisher = {Springer-Verlag LNCS 2760}
  824. }
  825. @Article{hordes-jcs,
  826. author = {Brian Neal Levine and Clay Shields},
  827. title = {Hordes: A Multicast-Based Protocol for Anonymity},
  828. journal = {Journal of Computer Security},
  829. year = 2002,
  830. volume = 10,
  831. number = 3,
  832. pages = {213--240}
  833. }
  834. @TechReport{herbivore,
  835. author = {Sharad Goel and Mark Robson and Milo Polte and Emin G\"{u}n Sirer},
  836. title = {Herbivore: A Scalable and Efficient Protocol for Anonymous Communication},
  837. institution = {Cornell University Computing and Information Science},
  838. year = 2003,
  839. type = {Technical Report},
  840. number = {TR2003-1890},
  841. month = {February}
  842. }
  843. @InProceedings{p5,
  844. author = {Rob Sherwood and Bobby Bhattacharjee and Aravind Srinivasan},
  845. title = {$P^5$: A Protocol for Scalable Anonymous Communication},
  846. booktitle = {2002 IEEE Symposium on Security and Privacy},
  847. pages = {58--70},
  848. year = 2002,
  849. publisher = {IEEE CS}
  850. }
  851. @phdthesis{ian-thesis,
  852. title = {A Pseudonymous Communications Infrastructure for the Internet},
  853. author = {Ian Goldberg},
  854. school = {UC Berkeley},
  855. year = {2000},
  856. month = {December},
  857. }
  858. @Article{taz,
  859. author = {Ian Goldberg and David Wagner},
  860. title = {TAZ Servers and the Rewebber Network: Enabling
  861. Anonymous Publishing on the World Wide Web},
  862. journal = {First Monday},
  863. year = 1998,
  864. volume = 3,
  865. number = 4,
  866. month = {August},
  867. note = {\url{http://www.firstmonday.dk/issues/issue3_4/goldberg/}}
  868. }
  869. @Misc{tcp-over-tcp-is-bad,
  870. key = {tcp-over-tcp-is-bad},
  871. title = {Why TCP Over TCP Is A Bad Idea},
  872. author = {Olaf Titz},
  873. note = {\url{http://sites.inka.de/sites/bigred/devel/tcp-tcp.html}}
  874. }
  875. @inproceedings{wright02,
  876. title = {An Analysis of the Degradation of Anonymous Protocols},
  877. author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields},
  878. booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '02},
  879. year = {2002},
  880. month = {February},
  881. publisher = {IEEE},
  882. }
  883. @inproceedings{wright03,
  884. title = {Defending Anonymous Communication Against Passive Logging Attacks},
  885. author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields},
  886. booktitle = {2003 IEEE Symposium on Security and Privacy},
  887. pages= {28--41},
  888. year = {2003},
  889. month = {May},
  890. publisher = {IEEE CS},
  891. }
  892. %%% Local Variables:
  893. %%% mode: latex
  894. %%% TeX-master: "tor-design"
  895. %%% End: