• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

Plug-and-play IP security - anonymity infrastructure instead of PKI (2013)

by Y Gilad, A Herzberg
Venue:In ESORICS
Add To MetaCart

Tools

Sorted by:
Results 1 - 3 of 3

Lightweight Source Authentication and Path Validation

by Tiffany Hyun-jin Kim, Cristina Basescu, Limin Jia, Soo Bum Lee, Yih-chun Hu, Adrian Perrig, Eth Zürich
"... In-network source authentication and path validation are funda-mental primitives to construct higher-level security mechanisms such as DDoS mitigation, path compliance, packet attribution, or protection against flow redirection. Unfortunately, currently pro-posed solutions either fall short of addre ..."
Abstract - Cited by 2 (2 self) - Add to MetaCart
In-network source authentication and path validation are funda-mental primitives to construct higher-level security mechanisms such as DDoS mitigation, path compliance, packet attribution, or protection against flow redirection. Unfortunately, currently pro-posed solutions either fall short of addressing important security concerns or require a substantial amount of router overhead. In this paper, we propose lightweight, scalable, and secure protocols for shared key setup, source authentication, and path validation. Our prototype implementation demonstrates the efficiency and scalabil-ity of the protocols, especially for software-based implementations.
(Show Context)

Citation Context

...ys, TOFU (Trust On First Use) in SSH, TOFU with Perspectives [36], RPKI with domain-certified host keys, self-certifying IDs as public keys [1,23,24,35], or self-validation using an anonymous service =-=[10]-=-. We assume that one of these approaches is used to set up symmetric key ˆKSD between source S and destination D. 3.2 Main Insights One of OPT’s crucial insights is our approach to avoid storing per-f...

Building Secure and Anonymous Communication Channel: Formal Model and its Prototype Implementation

by Keita Emura, Akira Kanaoka, Satoshi Ohta, Takeshi Takahashi
"... ar ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
Abstract not found
(Show Context)

Citation Context

..., wherein a user proves the possession of signatures using zero-knowledge proofs. Though Anon-pass does not consider end-to-end secure (encrypted) communication, our protocol does. Gilad and Herzberg =-=[14]-=- also considered how to distribute public keys using an anonymous service. They consider two peers, a querier and a responder. The querier specifies a random ephemeral public key that is not certified...

4 Building Secure and Anonymous Communication Channel: Formal Model and its Prototype Implementation

by Keita Emura, Akira Kanaoka, Satoshi Ohta, Takeshi Takahashi
"... ar ..."
Abstract - Add to MetaCart
Abstract not found
(Show Context)

Citation Context

..., wherein a user proves the possession of signatures using zero-knowledge proofs. Though Anon-pass does not consider end-to-end secure (encrypted) communication, our protocol does. Gilad and Herzberg =-=[14]-=- also considered how to distribute public keys using an anonymous service. They consider two peers, a querier and a responder. The querier specifies a random ephemeral public key that is not certified...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University