Skip to main navigation Skip to search Skip to main content

Handling Exit Node Vulnerability in Onion Routing with a Zero-Knowledge Proof

  • Nadav Voloch
  • , Maor Meir Hajaj

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Scopus citations

Abstract

Onion routing is a method for anonymous data transfer in a communication network. It is mostly used for the deep web via TOR's (The Onion Router) different services such as TOR browser, Atlas, Orbot, and more. In this network, messages are encrypted with several layers, each layer connects only with its predecessor. An anonymity problem arises at the destination point, the exit node, which is the final node in the onion chain of routing. In the exit node the final layer is decrypted, and the message is delivered to the recipient. The possible vulnerability is that if the exit node is compromised in some way, the attacker can receive the raw data that is being delivered, potentially including sensitive or personal information. There are some ways of handling this issue, such as SSL encryption or secure HTTP, but these are not anonymous by nature as certificates include personal verification. This paper suggests a new method for solving the Exit Node Vulnerability issue that keeps the privacy and anonymity of the network. The method uses Zero-Knowledge Proof (ZKP), an encryption scheme in which one party (the prover) can validate specific information to another side (the verifier) without disclosing any additional private information. The paper presents the full scheme that solves the Exit Node Vulnerability in Onion routing.

Original languageEnglish
Title of host publicationInformation Integration and Web Intelligence - 24th International Conference, iiWAS 2022, Proceedings
EditorsEric Pardede, Pari Delir Haghighi, Ismail Khalil, Gabriele Kotsis
PublisherSpringer Science and Business Media Deutschland GmbH
Pages399-405
Number of pages7
ISBN (Print)9783031210464
DOIs
StatePublished - 1 Jan 2022
Externally publishedYes
Event24th International Conference on Information Integration and Web Intelligence, iiWAS 2022, held in conjunction with the 20th International Conference on Advances in Mobile Computing and Multimedia Intelligence, MoMM 2022 - Virtual, Online
Duration: 28 Nov 202230 Nov 2022

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume13635 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference24th International Conference on Information Integration and Web Intelligence, iiWAS 2022, held in conjunction with the 20th International Conference on Advances in Mobile Computing and Multimedia Intelligence, MoMM 2022
CityVirtual, Online
Period28/11/2230/11/22

Keywords

  • Deep/Hidden Web
  • Exit node vulnerability
  • Onion routing
  • Zero-Knowledge Proof (ZKP)

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Handling Exit Node Vulnerability in Onion Routing with a Zero-Knowledge Proof'. Together they form a unique fingerprint.

Cite this