A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Secure and Anonymous Communication Technique: Formal Model and Its Prototype Implementation
2016
IEEE Transactions on Emerging Topics in Computing
Both anonymity and end-to-end encryption are recognized as important properties in privacy-preserving communication. However, secure and anonymous communication protocol that requires both anonymity and end-to-end encryption cannot be realized through a simple combination of current anonymous communication protocols and public key infrastructure (PKI). Indeed, the current PKI contradicts anonymity because the certificate for a user's public key identifies the user. Moreover, we believe that
doi:10.1109/tetc.2015.2400131
fatcat:6ij3ckwrgbcmnduowswhp52ije