By Topic

Anonymous Communication Protocol in Overlay Networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Jian Ren ; Dept. of Electr. & Comput. Eng., Michigan State Univ., East Lansing, MI ; Tongtong Li ; Keesook Han

Communication anonymity is becoming an increasingly important, or even indispensable security requirement for many applications. The existing research in anonymous communications can largely be divided into two categories: mix- based systems and secure multi-party computation-based systems, originating from mixnet and DC-net respectively. However, they either cannot provide provable anonymity, or suffer from transmission collision problem. In this paper, we first propose a novel unconditionally secure source anonymous message authentication code (SA-MAC) that can be applied to any messages without relying on any trusted third parties. While ensuring message sender anonymity, SM-MAC can also provide message content authenticity. We then propose a novel communication protocol that can hide the senders and the receivers from each other, and thus can be used for secure file sharing. The security analysis demonstrates that the proposed protocol is secure against various attacks. Our analysis also shows it is efficient and practical.

Published in:

Communications, 2008. ICC '08. IEEE International Conference on

Date of Conference:

19-23 May 2008