tor-design.bib 29 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875
  1. @Misc{anonymizer,
  2. key = {anonymizer},
  3. title = {The {Anonymizer}},
  4. note = {\url{http://www.anonymizer.com}}
  5. }
  6. @Misc{anonnet,
  7. key = {anonnet},
  8. title = {{AnonNet}},
  9. note = {\url{http://www.authnet.org/anonnet/}}
  10. }
  11. @inproceedings{econymics,
  12. title = {On the Economics of Anonymity},
  13. author = {Alessandro Acquisti and Roger Dingledine and Paul Syverson},
  14. booktitle = {Financial Cryptography, FC 2003},
  15. year = {2003},
  16. editor = {Rebecca N. Wright},
  17. publisher = {Springer-Verlag, LNCS 2742},
  18. note = {\url{http://freehaven.net/doc/fc03/econymics.pdf}},
  19. }
  20. @inproceedings{minion-design,
  21. title = {Mixminion: Design of a Type {III} Anonymous Remailer Protocol},
  22. author = {George Danezis and Roger Dingledine and Nick Mathewson},
  23. booktitle = {2003 IEEE Symposium on Security and Privacy},
  24. year = {2003},
  25. month = {May},
  26. publisher = {IEEE CS},
  27. pages = {2--15},
  28. note = {\url{http://mixminion.net/minion-design.pdf}},
  29. www_important = {1},
  30. www_section = {Anonymous communication},
  31. }
  32. @inproceedings{ rao-pseudonymity,
  33. author = "Josyula R. Rao and Pankaj Rohatgi",
  34. title = "Can Pseudonymity Really Guarantee Privacy?",
  35. booktitle = "Proceedings of the Ninth USENIX Security Symposium",
  36. year = {2000},
  37. month = Aug,
  38. publisher = {USENIX},
  39. pages = "85--96",
  40. note = {\url{http://www.usenix.org/publications/library/proceedings/sec2000/
  41. full_papers/rao/rao.pdf}},
  42. }
  43. @InProceedings{pfitzmann90how,
  44. author = "Birgit Pfitzmann and Andreas Pfitzmann",
  45. title = "How to Break the Direct {RSA}-Implementation of {MIXes}",
  46. booktitle = {Eurocrypt 89},
  47. publisher = {Springer-Verlag, LNCS 434},
  48. year = {1990},
  49. note = {\url{http://citeseer.nj.nec.com/pfitzmann90how.html}},
  50. }
  51. @Misc{mixminion-spec,
  52. author = {Mixminion},
  53. title = {Type {III} ({M}ixminion) Mix Protocol Specifications},
  54. note = {\newline \url{http://mixminion.net/minion-spec.txt}},
  55. }
  56. @InProceedings{BM:mixencrypt,
  57. author = {M{\"o}ller, Bodo},
  58. title = {Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes},
  59. booktitle = {{CT-RSA} 2003},
  60. publisher = {Springer-Verlag, LNCS 2612},
  61. year = 2003,
  62. }
  63. % Would a more recent reference for SPRPs be more useful?
  64. @Article{sprp,
  65. author = {Michael Luby and Charles Rackoff},
  66. title = {How to Construct Pseudorandom Permutations from
  67. Pseudorandom Functions},
  68. journal = {SIAM Journal on Computing},
  69. year = {1988},
  70. volume = {17},
  71. number = {2},
  72. pages = {373--386},
  73. }
  74. @InProceedings{back01,
  75. author = {Adam Back and Ulf M\"oller and Anton Stiglic},
  76. title = {Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems},
  77. booktitle = {Information Hiding (IH 2001)},
  78. pages = {245--257},
  79. year = 2001,
  80. editor = {Ira S. Moskowitz},
  81. publisher = {Springer-Verlag, LNCS 2137},
  82. note = {\newline \url{http://www.cypherspace.org/adam/pubs/traffic.pdf}},
  83. }
  84. @InProceedings{rackoff93cryptographic,
  85. author = {Charles Rackoff and Daniel R. Simon},
  86. title = {Cryptographic Defense Against Traffic Analysis},
  87. booktitle = {{ACM} Symposium on Theory of Computing},
  88. pages = {672--681},
  89. year = {1993},
  90. note = {\url{http://research.microsoft.com/crypto/dansimon/me.htm}},
  91. }
  92. @InProceedings{freehaven-berk,
  93. author = {Roger Dingledine and Michael J. Freedman and David Molnar},
  94. title = {The Free Haven Project: Distributed Anonymous Storage Service},
  95. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  96. on Design Issue in Anonymity and Unobservability},
  97. year = {2000},
  98. month = {July},
  99. editor = {H. Federrath},
  100. publisher = {Springer-Verlag, LNCS 2009},
  101. note = {\url{http://freehaven.net/papers.html}},
  102. }
  103. @InProceedings{raymond00,
  104. author = {J. F. Raymond},
  105. title = {{Traffic Analysis: Protocols, Attacks, Design Issues,
  106. and Open Problems}},
  107. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  108. on Design Issue in Anonymity and Unobservability},
  109. year = 2000,
  110. month = {July},
  111. pages = {10-29},
  112. editor = {H. Federrath},
  113. publisher = {Springer-Verlag, LNCS 2009},
  114. }
  115. @InProceedings{trickle02,
  116. author = {Andrei Serjantov and Roger Dingledine and Paul Syverson},
  117. title = {From a Trickle to a Flood: Active Attacks on Several
  118. Mix Types},
  119. booktitle = {Information Hiding (IH 2002)},
  120. year = {2002},
  121. editor = {Fabien Petitcolas},
  122. publisher = {Springer-Verlag, LNCS (forthcoming)},
  123. }
  124. @InProceedings{langos02,
  125. author = {Oliver Berthold and Heinrich Langos},
  126. title = {Dummy Traffic Against Long Term Intersection Attacks},
  127. booktitle = {Privacy Enhancing Technologies (PET 2002)},
  128. year = {2002},
  129. editor = {Roger Dingledine and Paul Syverson},
  130. publisher = {Springer-Verlag, LNCS 2482}
  131. }
  132. @InProceedings{or-discex00,
  133. author = {Paul Syverson and Michael Reed and David Goldschlag},
  134. title = {{O}nion {R}outing Access Configurations},
  135. booktitle = {DARPA Information Survivability Conference and
  136. Exposition (DISCEX 2000)},
  137. year = {2000},
  138. publisher = {IEEE CS Press},
  139. pages = {34--40},
  140. volume = {1},
  141. note = {\newline \url{http://www.onion-router.net/Publications.html}},
  142. }
  143. @Inproceedings{or-pet02,
  144. title = {{Towards an Analysis of Onion Routing Security}},
  145. author = {Paul Syverson and Gene Tsudik and Michael Reed and
  146. Carl Landwehr},
  147. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  148. on Design Issue in Anonymity and Unobservability},
  149. year = 2000,
  150. month = {July},
  151. pages = {96--114},
  152. editor = {H. Federrath},
  153. publisher = {Springer-Verlag, LNCS 2009},
  154. note = {\url{http://www.onion-router.net/Publications/WDIAU-2000.ps.gz}},
  155. }
  156. @InProceedings{or-ih96,
  157. author = {David M. Goldschlag and Michael G. Reed and Paul
  158. F. Syverson},
  159. title = {Hiding Routing Information},
  160. booktitle = {Information Hiding, First International Workshop},
  161. pages = {137--150},
  162. year = 1996,
  163. editor = {R. Anderson},
  164. month = {May},
  165. publisher = {Springer-Verlag, LNCS 1174},
  166. note = {\url{http://www.onion-router.net/Publications/IH-1996.ps.gz}}
  167. }
  168. @Article{or-jsac98,
  169. author = {Michael G. Reed and Paul F. Syverson and David
  170. M. Goldschlag},
  171. title = {Anonymous Connections and Onion Routing},
  172. journal = {IEEE Journal on Selected Areas in Communications},
  173. year = 1998,
  174. volume = 16,
  175. number = 4,
  176. pages = {482--494},
  177. month = {May},
  178. note = {\url{http://www.onion-router.net/Publications/JSAC-1998.ps.gz}}
  179. }
  180. @Misc{TLS,
  181. author = {T. Dierks and C. Allen},
  182. title = {The {TLS} {P}rotocol --- {V}ersion 1.0},
  183. howpublished = {IETF RFC 2246},
  184. month = {January},
  185. year = {1999},
  186. note = {\url{http://www.rfc-editor.org/rfc/rfc2246.txt}},
  187. }
  188. @Misc{SMTP,
  189. author = {J. Postel},
  190. title = {Simple {M}ail {T}ransfer {P}rotocol},
  191. howpublished = {IETF RFC 2821 (also STD0010)},
  192. month = {April},
  193. year = {2001},
  194. note = {\url{http://www.rfc-editor.org/rfc/rfc2821.txt}},
  195. }
  196. @Misc{IMAP,
  197. author = {M. Crispin},
  198. title = {Internet {M}essage {A}ccess {P}rotocol --- {V}ersion 4rev1},
  199. howpublished = {IETF RFC 2060},
  200. month = {December},
  201. year = {1996},
  202. note = {\url{http://www.rfc-editor.org/rfc/rfc2060.txt}},
  203. }
  204. @Misc{POP3,
  205. author = {J. Myers and M. Rose},
  206. title = {Post {O}ffice {P}rotocol --- {V}ersion 3},
  207. howpublished = {IETF RFC 1939 (also STD0053)},
  208. month = {May},
  209. year = {1996},
  210. note = {\url{http://www.rfc-editor.org/rfc/rfc1939.txt}},
  211. }
  212. @InProceedings{shuffle,
  213. author = {C. Andrew Neff},
  214. title = {A Verifiable Secret Shuffle and its Application to E-Voting},
  215. booktitle = {8th ACM Conference on Computer and Communications
  216. Security (CCS-8)},
  217. pages = {116--125},
  218. year = 2001,
  219. editor = {P. Samarati},
  220. month = {November},
  221. publisher = {ACM Press},
  222. note = {\url{http://www.votehere.net/ada_compliant/ourtechnology/
  223. technicaldocs/shuffle.pdf}},
  224. }
  225. @InProceedings{dolev91,
  226. author = {Danny Dolev and Cynthia Dwork and Moni Naor},
  227. title = {Non-Malleable Cryptography},
  228. booktitle = {23rd ACM Symposium on the Theory of Computing (STOC)},
  229. pages = {542--552},
  230. year = 1991,
  231. note = {Updated version at
  232. \url{http://citeseer.nj.nec.com/dolev00nonmalleable.html}},
  233. }
  234. @TechReport{rsw96,
  235. author = {Ronald L. Rivest and Adi Shamir and David A. Wagner},
  236. title = {Time-lock puzzles and timed-release Crypto},
  237. year = 1996,
  238. type = {MIT LCS technical memo},
  239. number = {MIT/LCS/TR-684},
  240. month = {February},
  241. note = {\newline \url{http://citeseer.nj.nec.com/rivest96timelock.html}},
  242. }
  243. @InProceedings{web-mix,
  244. author = {Oliver Berthold and Hannes Federrath and Stefan K\"opsell},
  245. title = {Web {MIX}es: A system for anonymous and unobservable
  246. {I}nternet access},
  247. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  248. on Design Issue in Anonymity and Unobservability},
  249. editor = {H. Federrath},
  250. publisher = {Springer-Verlag, LNCS 2009},
  251. pages = {115--129},
  252. year = 2000,
  253. }
  254. @InProceedings{disad-free-routes,
  255. author = {Oliver Berthold and Andreas Pfitzmann and Ronny Standtke},
  256. title = {The disadvantages of free {MIX} routes and how to overcome
  257. them},
  258. booktitle = {Designing Privacy Enhancing Technologies: Workshop
  259. on Design Issue in Anonymity and Unobservability},
  260. pages = {30--45},
  261. year = 2000,
  262. editor = {H. Federrath},
  263. publisher = {Springer-Verlag, LNCS 2009},
  264. note = {\url{http://www.tik.ee.ethz.ch/~weiler/lehre/netsec/Unterlagen/anon/
  265. disadvantages_berthold.pdf}},
  266. }
  267. @InProceedings{boneh00,
  268. author = {Dan Boneh and Moni Naor},
  269. title = {Timed Commitments},
  270. booktitle = {Advances in Cryptology -- {CRYPTO} 2000},
  271. pages = {236--254},
  272. year = 2000,
  273. publisher = {Springer-Verlag, LNCS 1880},
  274. note = {\newline \url{http://crypto.stanford.edu/~dabo/abstracts/timedcommit.html}},
  275. }
  276. @InProceedings{goldschlag98,
  277. author = {David M. Goldschlag and Stuart G. Stubblebine},
  278. title = {Publicly Verifiable Lotteries: Applications of
  279. Delaying Functions},
  280. booktitle = {Financial Cryptography, FC'98},
  281. pages = {214--226},
  282. year = 1998,
  283. publisher = {Springer-Verlag, LNCS 1465},
  284. note = {\newline \url{http://citeseer.nj.nec.com/goldschlag98publicly.html}},
  285. }
  286. @InProceedings{syverson98,
  287. author = {Paul Syverson},
  288. title = {Weakly Secret Bit Commitment: Applications to
  289. Lotteries and Fair Exchange},
  290. booktitle = {Computer Security Foundations Workshop (CSFW11)},
  291. pages = {2--13},
  292. year = 1998,
  293. address = {Rockport Massachusetts},
  294. month = {June},
  295. publisher = {IEEE CS Press},
  296. note = {\newline \url{http://chacs.nrl.navy.mil/publications/CHACS/1998/}},
  297. }
  298. @Misc{shoup-iso,
  299. author = {Victor Shoup},
  300. title = {A Proposal for an {ISO} {S}tandard for Public Key Encryption (version 2.1)},
  301. note = {Revised December 20, 2001. \url{http://www.shoup.net/papers/}},
  302. }
  303. @Misc{shoup-oaep,
  304. author = {Victor Shoup},
  305. title = {{OAEP} Reconsidered},
  306. howpublished = {{IACR} e-print 2000/060},
  307. note = {\newline \url{http://eprint.iacr.org/2000/060/}},
  308. }
  309. @Misc{oaep-still-alive,
  310. author = {E. Fujisaki and D. Pointcheval and T. Okamoto and J. Stern},
  311. title = {{RSA}-{OAEP} is Still Alive!},
  312. howpublished = {{IACR} e-print 2000/061},
  313. note = {\newline \url{http://eprint.iacr.org/2000/061/}},
  314. }
  315. @misc{echolot,
  316. author = {Peter Palfrader},
  317. title = {Echolot: a pinger for anonymous remailers},
  318. note = {\url{http://www.palfrader.org/echolot/}},
  319. }
  320. @Misc{mixmaster-attacks,
  321. author = {Lance Cottrell},
  322. title = {Mixmaster and Remailer Attacks},
  323. note = {\url{http://www.obscura.com/~loki/remailer/remailer-essay.html}},
  324. }
  325. @Misc{mixmaster-spec,
  326. author = {Ulf M{\"o}ller and Lance Cottrell and Peter
  327. Palfrader and Len Sassaman},
  328. title = {Mixmaster {P}rotocol --- {V}ersion 2},
  329. year = {2003},
  330. month = {July},
  331. howpublished = {Draft},
  332. note = {\url{http://www.abditum.com/mixmaster-spec.txt}},
  333. }
  334. @Article{mitzenm-loss,
  335. author = {G. Louth and M. Mitzenmacher and F.P. Kelly},
  336. title = {Computational Complexity of Loss Networks},
  337. journal = {Theoretical Computer Science},
  338. year = {1994},
  339. volume = {125},
  340. pages = {45-59},
  341. note = {\newline \url{http://citeseer.nj.nec.com/louth94computational.html}},
  342. }
  343. @Misc{hashcash,
  344. author = {Adam Back},
  345. title = {Hash cash},
  346. note = {\newline \url{http://www.cypherspace.org/~adam/hashcash/}},
  347. }
  348. @InProceedings{oreilly-acc,
  349. author = {Roger Dingledine and Michael J. Freedman and David Molnar},
  350. title = {Accountability},
  351. booktitle = {Peer-to-peer: Harnessing the Benefits of a Disruptive
  352. Technology},
  353. year = {2001},
  354. publisher = {O'Reilly and Associates},
  355. }
  356. @InProceedings{han,
  357. author = {Yongfei Han},
  358. title = {Investigation of non-repudiation protocols},
  359. booktitle = {ACISP '96},
  360. year = 1996,
  361. publisher = {Springer-Verlag},
  362. }
  363. @Misc{socks5,
  364. key = {socks5},
  365. title = {{SOCKS} {P}rotocol {V}ersion 5},
  366. howpublished= {IETF RFC 1928},
  367. month = {March},
  368. year = 1996,
  369. note = {\url{http://www.ietf.org/rfc/rfc1928.txt}}
  370. }
  371. @InProceedings{abe,
  372. author = {Masayuki Abe},
  373. title = {Universally Verifiable {MIX} With Verification Work Independent of
  374. The Number of {MIX} Servers},
  375. booktitle = {{EUROCRYPT} 1998},
  376. year = {1998},
  377. publisher = {Springer-Verlag, LNCS 1403},
  378. }
  379. @InProceedings{desmedt,
  380. author = {Yvo Desmedt and Kaoru Kurosawa},
  381. title = {How To Break a Practical {MIX} and Design a New One},
  382. booktitle = {{EUROCRYPT} 2000},
  383. year = {2000},
  384. publisher = {Springer-Verlag, LNCS 1803},
  385. note = {\url{http://citeseer.nj.nec.com/447709.html}},
  386. }
  387. @InProceedings{mitkuro,
  388. author = {M. Mitomo and K. Kurosawa},
  389. title = {{Attack for Flash MIX}},
  390. booktitle = {{ASIACRYPT} 2000},
  391. year = {2000},
  392. publisher = {Springer-Verlag, LNCS 1976},
  393. note = {\newline \url{http://citeseer.nj.nec.com/450148.html}},
  394. }
  395. @InProceedings{hybrid-mix,
  396. author = {M. Ohkubo and M. Abe},
  397. title = {A {L}ength-{I}nvariant {H}ybrid {MIX}},
  398. booktitle = {Advances in Cryptology - {ASIACRYPT} 2000},
  399. year = {2000},
  400. publisher = {Springer-Verlag, LNCS 1976},
  401. }
  402. @InProceedings{PShuffle,
  403. author = {Jun Furukawa and Kazue Sako},
  404. title = {An Efficient Scheme for Proving a Shuffle},
  405. editor = {Joe Kilian},
  406. booktitle = {CRYPTO 2001},
  407. year = {2001},
  408. publisher = {Springer-Verlag, LNCS 2139},
  409. }
  410. @InProceedings{jakobsson-optimally,
  411. author = "Markus Jakobsson and Ari Juels",
  412. title = "An Optimally Robust Hybrid Mix Network (Extended Abstract)",
  413. booktitle = {Principles of Distributed Computing - {PODC} '01},
  414. year = "2001",
  415. publisher = {ACM Press},
  416. note = {\url{http://citeseer.nj.nec.com/492015.html}},
  417. }
  418. @InProceedings{kesdogan,
  419. author = {D. Kesdogan and M. Egner and T. B\"uschkes},
  420. title = {Stop-and-Go {MIX}es Providing Probabilistic Anonymity in an Open
  421. System},
  422. booktitle = {Information Hiding (IH 1998)},
  423. year = {1998},
  424. publisher = {Springer-Verlag, LNCS 1525},
  425. note = {\url{http://www.cl.cam.ac.uk/~fapp2/ihw98/ihw98-sgmix.pdf}},
  426. }
  427. @InProceedings{socks4,
  428. author = {David Koblas and Michelle R. Koblas},
  429. title = {{SOCKS}},
  430. booktitle = {UNIX Security III Symposium (1992 USENIX Security
  431. Symposium)},
  432. pages = {77--83},
  433. year = 1992,
  434. publisher = {USENIX},
  435. }
  436. @InProceedings{flash-mix,
  437. author = {Markus Jakobsson},
  438. title = {Flash {M}ixing},
  439. booktitle = {Principles of Distributed Computing - {PODC} '99},
  440. year = {1999},
  441. publisher = {ACM Press},
  442. note = {\newline \url{http://citeseer.nj.nec.com/jakobsson99flash.html}},
  443. }
  444. @InProceedings{SK,
  445. author = {Joe Kilian and Kazue Sako},
  446. title = {Receipt-Free {MIX}-Type Voting Scheme - A Practical Solution to
  447. the Implementation of a Voting Booth},
  448. booktitle = {EUROCRYPT '95},
  449. year = {1995},
  450. publisher = {Springer-Verlag},
  451. }
  452. @InProceedings{OAEP,
  453. author = {M. Bellare and P. Rogaway},
  454. year = {1994},
  455. booktitle = {EUROCRYPT '94},
  456. title = {Optimal {A}symmetric {E}ncryption {P}adding : How To Encrypt With
  457. {RSA}},
  458. publisher = {Springer-Verlag},
  459. note = {\newline \url{http://www-cse.ucsd.edu/users/mihir/papers/oaep.html}},
  460. }
  461. @inproceedings{babel,
  462. title = {Mixing {E}-mail With {B}abel},
  463. author = {Ceki G\"ulc\"u and Gene Tsudik},
  464. booktitle = {Proceedings of the Network and Distributed Security Symposium - {NDSS} '96},
  465. year = 1996,
  466. month = {February},
  467. pages = {2--16},
  468. publisher = {IEEE},
  469. www_important = 1,
  470. note = {\url{http://citeseer.nj.nec.com/2254.html}},
  471. www_section = {Anonymous communication},
  472. }
  473. @InProceedings{freenet,
  474. author = {Ian Clarke and Oskar Sandberg and Brandon Wiley and Theodore W. Hong},
  475. title = {Freenet: {A} Distributed Anonymous Information Storage and Retrieval
  476. System},
  477. booktitle = {Workshop on Design Issues in Anonymity and Unobservability},
  478. pages = {46--66},
  479. year = {2000},
  480. note = {\newline \url{http://citeseer.nj.nec.com/clarke00freenet.html}},
  481. }
  482. @Misc{rprocess,
  483. author = {RProcess},
  484. title = {Selective Denial of Service Attacks},
  485. note = {\newline \url{http://www.eff.org/pub/Privacy/Anonymity/1999\_09\_DoS\_remail\_vuln.html}},
  486. }
  487. @Article{remailer-history,
  488. author = {Sameer Parekh},
  489. title = {Prospects for Remailers},
  490. journal = {First Monday},
  491. volume = {1},
  492. number = {2},
  493. month = {August},
  494. year = {1996},
  495. note = {\url{http://www.firstmonday.dk/issues/issue2/remailers/}},
  496. }
  497. @Misc{remailer-history-old,
  498. author = {Tim May},
  499. title = {Description of early remailer history},
  500. howpublished = {E-mail archived at
  501. \url{http://www.inet-one.com/cypherpunks/dir.1996.08.29-1996.09.04/
  502. msg00431.html}},
  503. }
  504. @Article{chaum-mix,
  505. author = {David Chaum},
  506. title = {Untraceable electronic mail, return addresses, and digital pseudo-nyms},
  507. journal = {Communications of the ACM},
  508. year = {1981},
  509. volume = {4},
  510. number = {2},
  511. month = {February},
  512. note = {\url{http://www.eskimo.com/~weidai/mix-net.txt}},
  513. }
  514. @InProceedings{nym-alias-net,
  515. author = {David Mazi\`{e}res and M. Frans Kaashoek},
  516. title = {{The Design, Implementation and Operation of an Email
  517. Pseudonym Server}},
  518. booktitle = {$5^{th}$ ACM Conference on Computer and
  519. Communications Security (CCS'98)},
  520. year = 1998,
  521. publisher = {ACM Press},
  522. note = {\newline \url{http://www.scs.cs.nyu.edu/~dm/}},
  523. }
  524. @Misc{timmay,
  525. author = {Tim May},
  526. title = {Cyphernomicon},
  527. note = {\newline \url{http://www2.pro-ns.net/~crypto/cyphernomicon.html}},
  528. }
  529. @misc{neochaum,
  530. author = {Tim May},
  531. title = {Payment mixes for anonymity},
  532. howpublished = {E-mail archived at
  533. \url{http://\newline www.inet-one.com/cypherpunks/dir.2000.02.28-2000.03.05/msg00334.html}},
  534. }
  535. @misc{pidaho,
  536. author = {Joel McNamara},
  537. title = {{P}rivate {I}daho},
  538. note = {\newline \url{http://www.eskimo.com/~joelm/pi.html}},
  539. }
  540. @misc{potato,
  541. author = {RProcess},
  542. title = {{P}otato {S}oftware},
  543. note = {\newline \url{http://www.skuz.net/potatoware/}},
  544. }
  545. @misc{helsingius,
  546. author = {J. Helsingius},
  547. title = {{\tt anon.penet.fi} press release},
  548. note = {\newline \url{http://www.penet.fi/press-english.html}},
  549. }
  550. @misc{mix-stats,
  551. author = {Christian Mock},
  552. title = {Mixmaster Stats ({A}ustria)},
  553. note = {\newline \url{http://www.tahina.priv.at/~cm/stats/mlist2.html}},
  554. }
  555. @InProceedings{garay97secure,
  556. author = {J. Garay and R. Gennaro and C. Jutla and T. Rabin},
  557. title = {Secure distributed storage and retrieval},
  558. booktitle = {11th International Workshop, WDAG '97},
  559. pages = {275--289},
  560. year = {1997},
  561. publisher = {Springer-Verlag, LNCS 1320},
  562. note = {\newline \url{http://citeseer.nj.nec.com/garay97secure.html}},
  563. }
  564. @InProceedings{PIK,
  565. author = {C. Park and K. Itoh and K. Kurosawa},
  566. title = {Efficient anonymous channel and all/nothing election scheme},
  567. booktitle = {Advances in Cryptology -- {EUROCRYPT} '93},
  568. pages = {248--259},
  569. publisher = {Springer-Verlag, LNCS 765},
  570. }
  571. @Misc{pgpfaq,
  572. key = {PGP},
  573. title = {{PGP} {FAQ}},
  574. note = {\newline \url{http://www.faqs.org/faqs/pgp-faq/}},
  575. }
  576. @Article{riordan-schneier,
  577. author = {James Riordan and Bruce Schneier},
  578. title = {A Certified E-mail Protocol with No Trusted Third Party},
  579. journal = {13th Annual Computer Security Applications Conference},
  580. month = {December},
  581. year = {1998},
  582. note = {\newline \url{http://www.counterpane.com/certified-email.html}},
  583. }
  584. @Article{crowds-tissec,
  585. author = {Michael K. Reiter and Aviel D. Rubin},
  586. title = {Crowds: Anonymity for Web Transactions},
  587. journal = {ACM TISSEC},
  588. year = 1998,
  589. volume = 1,
  590. number = 1,
  591. pages = {66--92},
  592. month = {November},
  593. note = {\url{http://citeseer.nj.nec.com/284739.html}}
  594. }
  595. @Article{crowds-dimacs,
  596. author = {Michael K. Reiter and Aviel D. Rubin},
  597. title = {Crowds: Anonymity for Web Transactions},
  598. journal = {{DIMACS} Technical Report (Revised)},
  599. volume = {97},
  600. number = {15},
  601. month = {August},
  602. year = {1997},
  603. }
  604. @Misc{freedom,
  605. author = {Zero Knowledge Systems},
  606. title = {Freedom Version 2 White Papers},
  607. note = {\newline \url{http://www.freedom.net/info/whitepapers/}},
  608. }
  609. @Misc{recovery,
  610. author = {Miguel Castro and Barbara Liskov},
  611. title = {Proactive Recovery in a Byzantine-Fault-Tolerant System},
  612. note = {\newline \url{http://www.pmg.lcs.mit.edu/~castro/application/recovery.pdf}},
  613. }
  614. @Misc{advogato,
  615. author = {Raph Levien},
  616. title = {Advogato's Trust Metric},
  617. note = {\newline \url{http://www.advogato.org/trust-metric.html}},
  618. }
  619. @Misc{rabin-ida,
  620. author = {Michael O. Rabin},
  621. title = {Efficient Dispersal of Information for security, load balancing,
  622. and fault tolerance},
  623. booktitle = {Journal of the ACM},
  624. year = {1989},
  625. volume = {36},
  626. number = {2},
  627. series = {335--348},
  628. month = {April},
  629. }
  630. @PhdThesis{malkin-thesis,
  631. author = {Tal Malkin},
  632. school = {{MIT}},
  633. title = {Private {I}nformation {R}etrieval},
  634. year = {2000},
  635. note = {\newline \url{http://toc.lcs.mit.edu/~tal/pubs.html}}
  636. }
  637. @Misc{zks,
  638. title = {Zero {K}nowledge {S}ystems},
  639. note = {\newline \url{http://www.freedom.net/}},
  640. }
  641. @InProceedings{publius,
  642. author = {Marc Waldman and Aviel Rubin and Lorrie Cranor},
  643. title = {Publius: {A} robust, tamper-evident, censorship-resistant and
  644. source-anonymous web publishing system},
  645. booktitle = {Proc. 9th USENIX Security Symposium},
  646. pages = {59--72},
  647. year = {2000},
  648. month = {August},
  649. note = {\newline \url{http://citeseer.nj.nec.com/waldman00publius.html}},
  650. }
  651. @Misc{freedom-nyms,
  652. author = {Russell Samuels},
  653. title = {Untraceable Nym Creation on the {F}reedom {N}etwork},
  654. year = {1999},
  655. month = {November},
  656. day = {21},
  657. note = {\newline \url{http://www.freedom.net/products/whitepapers/white11.html}},
  658. }
  659. @Article{raghavan87randomized,
  660. author = {P. Raghavan and C. Thompson},
  661. title = {Randomized rounding: A technique for provably good algorithms and algorithmic proofs},
  662. journal = {Combinatorica},
  663. volume = {7},
  664. pages = {365--374},
  665. year = {1987},
  666. }
  667. @InProceedings{leighton91fast,
  668. author = {Frank Thomson Leighton and Fillia Makedon and Serge A. Plotkin and
  669. Clifford Stein and Eva Tardos and Spyros Tragoudas},
  670. title = {Fast Approximation Algorithms for Multicommodity Flow Problems},
  671. booktitle = {{ACM} Symposium on Theory of Computing},
  672. pages = {101-111},
  673. year = {1991},
  674. note = {\newline \url{http://citeseer.nj.nec.com/91073.html}},
  675. }
  676. @Misc{pk-relations,
  677. author = {M. Bellare and A. Desai and D. Pointcheval and P. Rogaway},
  678. title = {Relations Among Notions of Security for Public-Key Encryption
  679. Schemes},
  680. howpublished = {
  681. Extended abstract in {\em Advances in Cryptology - CRYPTO '98}, LNCS Vol. 1462.
  682. Springer-Verlag, 1998.
  683. Full version available from \newline \url{http://www-cse.ucsd.edu/users/mihir/}},
  684. }
  685. @InProceedings{mix-acc,
  686. author = {Roger Dingledine and Michael J. Freedman and David
  687. Hopwood and David Molnar},
  688. title = {{A Reputation System to Increase MIX-net
  689. Reliability}},
  690. booktitle = {Information Hiding (IH 2001)},
  691. pages = {126--141},
  692. year = 2001,
  693. editor = {Ira S. Moskowitz},
  694. publisher = {Springer-Verlag, LNCS 2137},
  695. note = {\url{http://www.freehaven.net/papers.html}},
  696. }
  697. @InProceedings{casc-rep,
  698. author = {Roger Dingledine and Paul Syverson},
  699. title = {{Reliable MIX Cascade Networks through Reputation}},
  700. booktitle = {Financial Cryptography (FC '02)},
  701. year = 2002,
  702. editor = {Matt Blaze},
  703. publisher = {Springer-Verlag, LNCS (forthcoming)},
  704. note = {\newline \url{http://www.freehaven.net/papers.html}},
  705. }
  706. @InProceedings{zhou96certified,
  707. author = {Zhou and Gollmann},
  708. title = {Certified Electronic Mail},
  709. booktitle = {{ESORICS: European Symposium on Research in Computer
  710. Security}},
  711. publisher = {Springer-Verlag, LNCS 1146},
  712. year = {1996},
  713. note = {\newline \url{http://citeseer.nj.nec.com/zhou96certified.html}},
  714. }
  715. @Misc{realtime-mix,
  716. author = {Anja Jerichow and Jan M\"uller and Andreas Pfitzmann and
  717. Birgit Pfitzmann and Michael Waidner},
  718. title = {{Real-Time MIXes: A Bandwidth-Efficient Anonymity Protocol}},
  719. howpublished = {IEEE Journal on Selected Areas in Communications, 1998.},
  720. note = {\url{http://www.zurich.ibm.com/security/publications/1998.html}},
  721. }
  722. @InProceedings{BEAR-LIONESS,
  723. author = {Ross Anderson and Eli Biham},
  724. title = {Two Practical and Provably Secure Block Ciphers: {BEAR} and {LION}},
  725. booktitle = {International Workshop on Fast Software Encryption},
  726. year = {1996},
  727. publisher = {Springer-Verlag},
  728. note = {\url{http://citeseer.nj.nec.com/anderson96two.html}},
  729. }
  730. @Misc{SPC,
  731. author = {Daniel Bleichenbacher and Anand Desai},
  732. title = {A Construction of a Super-Pseudorandom Cipher},
  733. howpublished = {Manuscript},
  734. }
  735. @InProceedings{gap-pets03,
  736. author = {Krista Bennett and Christian Grothoff},
  737. title = {{GAP} -- practical anonymous networking},
  738. booktitle = {Privacy Enhancing Technologies (PET 2003)},
  739. year = 2003,
  740. editor = {Roger Dingledine},
  741. publisher = {Springer-Verlag LNCS (forthcoming)}
  742. }
  743. @Article{hordes-jcs,
  744. author = {Brian Neal Levine and Clay Shields},
  745. title = {Hordes: A Multicast-Based Protocol for Anonymity},
  746. journal = {Journal of Computer Security},
  747. year = 2002,
  748. volume = 10,
  749. number = 3,
  750. pages = {213--240}
  751. }
  752. @TechReport{herbivore,
  753. author = {Sharad Goel and Mark Robson and Milo Polte and Emin G\"{u}n Sirer},
  754. title = {Herbivore: A Scalable and Efficient Protocol for Anonymous Communication},
  755. institution = {Cornell University Computing and Information Science},
  756. year = 2003,
  757. type = {Technical Report},
  758. number = {TR2003-1890},
  759. month = {February}
  760. }
  761. @InProceedings{p5,
  762. author = {Rob Sherwood and Bobby Bhattacharjee and Aravind Srinivasan},
  763. title = {$P^5$: A Protocol for Scalable Anonymous Communication},
  764. booktitle = {2002 IEEE Symposium on Security and Privacy},
  765. pages = {58--70},
  766. year = 2002,
  767. publisher = {IEEE CS}
  768. }
  769. %%% Local Variables:
  770. %%% mode: latex
  771. %%% TeX-master: "tor-design"
  772. %%% End: