Search Results

1 - 3 of 3 items :

  • "Construction Protocol" x
Clear All

. Comparative Study of Acceptance and Adaptation to New Complete Dentures, Using Two Construction Protocols. J Prosthodont, 2016;25:536-543. 26. Abduo J. Occlusal Schemes for Complete Dentures: A Systematic Review. Int J Prosthodont, 2013;26:26-33. 27. Carlsson GE. Critical review of some dogmas in prosthodontics. J Prosthodont Res, 2009;53:3-10. 28. Zhao K, Mai QQ, Wang XD, Yang W, Zhao L. Occlusal designs on masticatory ability and patient satisfaction with complete denture: A systematic review. J Dent, 2013;41:1036-1042. 29. Peroz I, Leuenberg A, Haustein I, Lange KP


Maintaining privacy on the Internet with the presence of powerful adversaries such as nation-state attackers is a challenging topic, and the Tor project is currently the most important tool to protect against this threat. The circuit construction protocol (CCP) negotiates cryptographic keys for Tor circuits, which overlay TCP/IP by routing Tor cells over n onion routers. The current circuit construction protocol provides strong security guarantees such as forward secrecy by exchanging 𝒪(n 2) messages.

For several years it has been an open question if the same strong security guarantees could be achieved with less message overhead, which is desirable because of the inherent latency in overlay networks. Several publications described CCPs which require only 𝒪(n) message exchanges, but significantly reduce the security of the resulting Tor circuit. It was even conjectured that it is impossible to achieve both message complexity 𝒪(n) and forward secrecy immediately after circuit construction (so-called immediate forward secrecy). Inspired by the latest advancements in zero round-trip time key exchange (0-RTT), we present a new CCP protocol Tor 0-RTT (T0RTT). Using modern cryptographic primitives such as puncturable encryption allow to achieve immediate forward secrecy using only 𝒪(n) messages. We implemented these new primitives to give a first indication of possible problems and how to overcome them in order to build practical CCPs with 𝒪(n) messages and immediate forward secrecy in the future.

References [1] A. Perrig, R. Szewczyk, V. Wen, D. Culler, J. Tygar, Spins: Security protocols for sensor networks, Wireless Networks Journal (WINET), 8 (5), 2002, 521–534. [2] Asha Rani Mishra and Mahesh Singh, Elliptic Curve Cryptography (ECC) for Security in wireless Sensor Network, International Journal of Engineering Research & Technology (IJERT) , Vol. 1 Issue 3, May 2012. [3] B. Lai, S. Kim, I. Verbauwhede, Scalable session key construction protocol for wireless sensor networks, IEEE Workshop on Large Scale Real-Time and Embedded Systems (LARTES), IEEE