Tor; proof of work; crypto-currency; micropayment; mining pool
Résumé :
[en] In this paper we propose a new micropayments scheme which can be used to reward Tor relay operators. Tor clients do not pay Tor relays with electronic cash directly but submit proof of work shares which the relays can resubmit to a crypto-currency mining pool. Relays credit users who submit shares with tickets that can later be used to purchase improved service. Both shares and tickets when sent over Tor circuits are anonymous. The analysis of the crypto-currencies market prices shows that the proposed scheme can compensate significant part of Tor relay operator's expenses.
Disciplines :
Sciences informatiques
Auteur, co-auteur :
BIRYUKOV, Alex ; University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC) ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
PUSTOGAROV, Ivan ; University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)
Langue du document :
Anglais
Titre :
Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay
Date de publication/diffusion :
janvier 2015
Nom de la manifestation :
Financial Cryptography and Data Security
Lieu de la manifestation :
Puerto Rico, Etats-Unis
Date de la manifestation :
from 26-01-2015 to 30-01-2015
Manifestation à portée :
International
Titre de l'ouvrage principal :
Financial Cryptography and Data Security - 19th International Conference
Abe, M., Okamoto, T.: Provably secure partially blind signatures. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 271–286. Springer, Heidelberg (2000)
AlSabah, M., Bauer, K., Elahi, T., Goldberg, I.: The path less travelled: overcoming Tor’s Bottlenecks with traffic splitting. In: De Cristofaro, E., Wright, M. (eds.) PETS 2013. LNCS, vol. 7981, pp. 143–163. Springer, Heidelberg (2013)
Chaum, D.: Blind signatures for untraceable payments. In: Chaum, D., Rivest, R., Sherman, A. (eds.) Advances in Cryptology, pp. 199–203. Springer, US (1983)
Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium, August 2004
Evans, J.W., Filsfils, C.: Deploying IP and MPLS QoS for Multiservice Networks: Theory & Practice. Morgan Kaufmann Publishers Inc., San Francisco (2007)
From Onions to Shallots: Rewarding Tor Relays with TEARS (2014). http://dedis.cs.yale.edu/dissent/papers/hotpets14-tears.pdf
Hetzner Online Server Auction (2014). https://robot.your-server.de/order/market
Hidden Services need some love (2014). https://blog.torproject.org/blog/hidden-services-need-some-love
How much bandwidth does Skype need? (2014). https://support.skype.com/en/faq/FA1417/how-much-bandwidth-does-skype-need
Jansen, R., Hopper, N., Kim, Y.: Recruiting new Tor relays with BRAIDS. In: Keromytis, A.D., Shmatikov, V. (eds.) Proceedings of the 2010 ACM Conference on Computer and Communications Security (CCS 2010), ACM, October 2010
Jansen, R., Johnson, A., Syverson, P.: LIRA: lightweight incentivized routing for anonymity. In: Proceedings of the Network and Distributed System Security Symposium - NDSS 2013. Internet Society, February 2013
Linux HTB Home Page (2014). http://luxik.cdi.cz/devik/qos/htb/
Ghosh, M., Richardson, M., Ford, B., Jansen, R.: A TorPath to TorCoin: proofof- bandwidth altcoins for compensating relays. In: 7th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs), July 2014
Massive spike of Tor users caused by Mevade botnet (2014). http://www.net-security.org/secworld.php?id=15530
Miers, I., Garman, C., Green, M., Rubin, A.D.: Zerocoin: anonymous distributed e-cash from bitcoin. In: IEEE Symposium on Security and Privacy (2013)
Johnny Ngan T.-W., Dingledine, R., Wallach, D.S.: Building incentives into Tor. In: Sion, R. (ed.) FC 2010. LNCS, vol. 6052, pp. 238–256. Springer, Heidelberg (2010)
Ostrovsky, R.: A proposal for internet computation commerce: how to tap the power of the web. In: Presentation at CRYPTO 1998 rump session (1998)
Ron, D., Shamir, A.: Quantitative analysis of the full bitcoin transaction graph. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 6–24. Springer, Heidelberg (2013)
Tor Metrics: Performance (2014). https://metrics.torproject.org/performance.html
Windows GPU Miners for the More Commonly Used Crypto Algorithms (2014). http://cryptomining-blog.com/2595-windows-gpu-miners-for-the-morecommonly-used-crypto-algorithms/