首页> 外文会议>2012 IEEE 25th computer security foundations symposium >Provably Secure and Practical Onion Routing
【24h】

Provably Secure and Practical Onion Routing

机译:可行的安全实用的洋葱路由

获取原文
获取原文并翻译 | 示例

摘要

The onion routing network Tor is undoubtedly the most widely employed technology for anonymous web access. Although the underlying onion routing (OR) protocol appears satisfactory, a comprehensive analysis of its security guarantees is still lacking. This has also resulted in a significant gap between research work on OR protocols and existing OR anonymity analyses. In this work, we address both issues with onion routing by defining a provably secure OR protocol, which is practical for deployment in the next generation Tor network. We start off by presenting a security definition (an ideal functionality) for the OR methodology in the universal compos ability (UC) framework. We then determine the exact security properties required for OR cryptographic primitives (onion construction and processing algorithms, and a key exchange protocol) to achieve a provably secure OR protocol. We show that the currently deployed onion algorithms with slightly strengthened integrity properties can be used in a provably secure OR construction. In the process, we identify the concept of predictably malleable symmetric encryptions, which might be of independent interest. On the other hand, we find the currently deployed key exchange protocol to be inefficient and difficult to analyze and instead show that a recent, significantly more efficient, key exchange protocol can be used in a provably secure OR construction. In addition, our definition greatly simplifies the process of analyzing OR anonymity metrics. We define and prove forward secrecy for the OR protocol, and realize our (white-box) OR definition from an OR black-box model assumed in a recent anonymity analysis. This realization not only makes the analysis formally applicable to the OR protocol but also identifies the exact adversary and network assumptions made by the black box model.
机译:洋葱路由网络无疑是用于匿名Web访问的最广泛使用的技术。尽管基本的洋葱路由(OR)协议看起来令人满意,但是仍缺乏对其安全性保证的全面分析。这也导致在OR协议的研究工作与现有OR匿名性分析之间存在巨大差距。在这项工作中,我们通过定义可验证的安全OR协议解决了洋葱路由这两个问题,这对于在下一代Tor网络中进行部署非常实用。我们首先为通用组合功能(UC)框架中的OR方法提供一个安全性定义(一种理想的功能)。然后,我们确定OR密码基元(洋葱构造和处理算法以及密钥交换协议)所需的确切安全属性,以实现可证明的安全OR协议。我们表明,当前部署的具有稍微增强的完整性属性的洋葱算法可用于可证明的安全OR构造。在此过程中,我们确定了可预测的延展性对称加密的概念,该概念可能具有独立的意义。另一方面,我们发现当前部署的密钥交换协议效率低下且难以分析,相反,它表明可以在可证明安全的OR构造中使用最新的,效率更高的密钥交换协议。此外,我们的定义大大简化了分析OR匿名指标的过程。我们定义并证明了OR协议的前向保密性,并从最近的匿名分析中假设的OR黑盒模型中实现了我们的(白盒)OR定义。这种认识不仅使分析正式适用于OR协议,而且可以识别黑匣子模型做出的确切对手和网络假设。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号