Skip to main content

The Strong Eternity Service

  • Conference paper
  • First Online:
Information Hiding (IH 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2137))

Included in the following conference series:

Abstract

Strong Eternity Service is a safe and very reliable storage for data of high importance. We show how to establish persistent pseudonyms in a totally anonymous environment and how to create a unique fully distributed name-space allowing both computer-efficient and human-acceptable access. We also present a way how to retrieve information from such data storage. We adapt the notion of the mix-network so that it can provide symmetric anonymity to both the client and the server. Finally we propose a system of after-the-act payments that can support operation of the Service without compromising anonymity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ross J. Anderson. The eternity service. In Pragocrypt 1996, 1996. http://www.cl.cam.ac.uk/rja/eternity.html.

  2. A. Back. The eternity service. Phrack Magazine, 7(51), Sep 1997. http://www.cypherspace.org/~adam/eternity/phrack.html.

  3. I. Brown. Eternity service design. http://www.cypherspace.org/eternity-design.html.

  4. D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2):84–88, Feb 1981.

    Google Scholar 

  5. Wei Dai. PipeNet 1.1. http://www.eskimo.com/~weidai/pipenet.txt.

  6. D. M. Goldschlag, G. R. Michael, and P. F. Syverson. Hiding routing information. In Workshop on Information Hiding, Cambridge, UK, May 1996.

    Google Scholar 

  7. D. Mills. Simple network time protocol (SNTP) version 4 for IPv4, IPv6 and OSI. Technical Report RFC-867, University of Delaware, Network Working Group, Oct 1996.

    Google Scholar 

  8. David L. Mills. Network time protocol (version 3) specification, implementation and analysis. Technical Report RFC 1305, University of Delaware, Mar 1992.

    Google Scholar 

  9. Michael G. Reed, Paul F. Syverson, and David M. Goldschlag. Anonymous connections and onion routing. IEEE Journal on Selected Areas in Communication Special Issue on Copyright and Privacy Protection, 1998.

    Google Scholar 

  10. Paul F. Syverson, David M. Goldschlag, and Michael G. Reed. Anonymous connections and onion routing. In 18th Annual Symposium on Security and Privacy, pages 44–54. IEEE CS Press, May 1997.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Beneš, T. (2001). The Strong Eternity Service. In: Moskowitz, I.S. (eds) Information Hiding. IH 2001. Lecture Notes in Computer Science, vol 2137. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45496-9_16

Download citation

  • DOI: https://doi.org/10.1007/3-540-45496-9_16

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42733-9

  • Online ISBN: 978-3-540-45496-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics