Tor onion services, also known as hidden services, are anonymous servers of unknown location and ownership that can be accessed through any Torenabled client. They have gained popularity over the years, but since their introduction in 2002 still suffer from major usability challenges primarily due to their cryptographically-generated non-memorable addresses.
In response to this difficulty, in this work we introduce the Onion Name System (OnioNS), a privacy-enhanced decentralized name resolution service. OnioNS allows Tor users to reference an onion service by a meaningful globally-unique verifiable domain name chosen by the onion service administrator.We construct OnioNS as an optional backwards-compatible plugin for Tor, simplify our design and threat model by embedding OnioNS within the Tor network, and provide mechanisms for authenticated denial-of-existence with minimal networking costs. We introduce a lottery-like system to reduce the threat of land rushes and domain squatting. Finally, we provide a security analysis, integrate our software with the Tor Browser, and conduct performance tests of our prototype.
If the inline PDF is not rendering correctly, you can download the PDF file here.
 Baruch Awerbuch and Christian Scheideler Group spreading: A protocol for provably secure distributed name service Automata Languages and Programming Springer 2004 pp. 183-195.
 Daniel J Bernstein Dnscurve: Usable security for dns http: //dnscurve.org/ 2009.
 Daniel J Bernstein Niels Duif Tanja Lange Peter Schwabe and Bo-Yin Yang High-speed high-security signatures Journal of Cryptographic Engineering 2 (2012) no. 2 77-89.
 Botan Developers Botan: Crypto and tls for c++11 http: //botan.randombit.net/ 2016.
 Roger Dingledine Nick Mathewson and Paul Syverson Tor: The second-generation onion router Tech. report DTIC Document 2004.
 Ittay Eyal The miner’s dilemma Security and Privacy (SP) 2015 IEEE Symposium on IEEE 2015 pp. 89-103.
 Internet Engineering Task Force Dns security (dnssec) hashed authenticated denial of existence https://tools.ietf.org/html/rfc5155 2008.
 Michael T Goodrich Roberto Tamassia and Andrew Schwerin Implementation of an authenticated dictionary with skip lists and commutative hashing DARPA Information Survivability Conference & Exposition II 2001. DISCEX’01. Proceedings vol. 2 IEEE 2001 pp. 68-82.
 David Goulet and George Kadianakis Random number generation during tor voting https://gitweb.torproject.org/torspec.git/tree/proposals/250-commit-reveal-consensus.txt 2015.