scispace - formally typeset
Search or ask a question

Showing papers on "Trusted third party published in 1993"


Proceedings ArticleDOI
12 Dec 1993
TL;DR: This paper proposes a third-parties method to avoid the traffic direction analysis, where all of the third parties don't recognize the original sender, real receiver, and the data sent from theOriginal sender.
Abstract: Traffic analysis is the inference of information (for example, presence, absence, amount, direction and frequency) from the observation of traffic flows. This paper proposes a third-parties method to avoid the traffic direction analysis. The third parties are those network users whose obligation is 20 redirect received messages to next third party. All the messages are encrypted by the same public key cryptosystem and composed of three message elements. The first message element is a random number which is added to prevent the reconstruction attack. The second message element is used to identify the next third party. The third message element is passed to the next third party identified by the second one. The next third party will follow the same process as above. The number of the third parties as determined by the original sender in the session. But all of the third parties don't recognize the original sender, real receiver, and the data sent from the original sender. The security level is as good as the public key cryptosystem which the third-party method is employed. >