The aim of this paper is to introduce some modifications in Tor, in order to improve user’s anonymity
and relay’s security. Thus, we introduced a system that will ensure anonymity for all users, while
maintaining the ability to break the anonymity of a sender in case of misconduct. The revocation of
the anonymity will require the use of secret sharing schemes, since we assume that, the lifting of the
anonymity of the dishonest user should not depend on a single entity, but on a consensus within the
network. In addition to the revocation of the anonymity, we propose in this paper further improvements such as mixing Tor traffic with those of the major internet groups, using the camouflage, or introducing a honeypot in the network
more here.............http://eprint.iacr.org/2014/787.pdf
and relay’s security. Thus, we introduced a system that will ensure anonymity for all users, while
maintaining the ability to break the anonymity of a sender in case of misconduct. The revocation of
the anonymity will require the use of secret sharing schemes, since we assume that, the lifting of the
anonymity of the dishonest user should not depend on a single entity, but on a consensus within the
network. In addition to the revocation of the anonymity, we propose in this paper further improvements such as mixing Tor traffic with those of the major internet groups, using the camouflage, or introducing a honeypot in the network
more here.............http://eprint.iacr.org/2014/787.pdf