Do you see what I see? differential treatment of anonymous users
S Khattak, D Fifield, S Afroz, M Javed, S Sundaresan… - 2016 - discovery.ucl.ac.uk
The utility of anonymous communication is undermined by a growing number of websites
treating users of such services in a degraded fashion. The second-class treatment of …
treating users of such services in a degraded fashion. The second-class treatment of …
Zero-knowledge argument for polynomial evaluation with application to blacklists
S Bayer, J Groth - Advances in Cryptology–EUROCRYPT 2013: 32nd …, 2013 - Springer
Verification of a polynomial's evaluation in a secret committed value plays a role in
cryptographic applications such as non-membership or membership proofs. We construct a …
cryptographic applications such as non-membership or membership proofs. We construct a …
[PDF][PDF] BLACR: TTP-Free Blacklistable Anonymous Credentials with Reputation.
Anonymous authentication can give users the license to misbehave since there is no fear of
retribution. As a deterrent or means to revocation, various schemes for accountable …
retribution. As a deterrent or means to revocation, various schemes for accountable …
Formalizing anonymous blacklisting systems
R Henry, I Goldberg - 2011 IEEE Symposium on Security and …, 2011 - ieeexplore.ieee.org
Anonymous communications networks, such as Tor, help to solve the real and important
problem of enabling users to communicate privately over the Internet. However, in doing so …
problem of enabling users to communicate privately over the Internet. However, in doing so …
Computing small discrete logarithms faster
Computations of small discrete logarithms are feasible even in “secure” groups, and are
used as subroutines in several cryptographic protocols in the literature. For example, the …
used as subroutines in several cryptographic protocols in the literature. For example, the …
Anon-pass: Practical anonymous subscriptions
We present the design, security proof, and implementation of an anonymous subscription
service. Users register for the service by providing some form of identity, which might or …
service. Users register for the service by providing some form of identity, which might or …
PERM: Practical reputation-based blacklisting without TTPs
Some users may misbehave under the cover of anonymity by, eg, defacing webpages on
Wikipedia or posting vulgar comments on YouTube. To prevent such abuse, a few …
Wikipedia or posting vulgar comments on YouTube. To prevent such abuse, a few …
Privacy enhancing technologies implementation: An Investigation of its impact on work processes and employee perception
With increasing consumer awareness towards information privacy and government-enforced
regulations on data protection, organizations are implementing Privacy Enhancing …
regulations on data protection, organizations are implementing Privacy Enhancing …
Privacy-preserving alibi systems
B Davis, H Chen, M Franklin - Proceedings of the 7th ACM Symposium …, 2012 - dl.acm.org
An alibi provides evidence of a person's past location and can be critical in proving ones
innocence. An alibi involves two parties: the owner, who benefits from the alibi, and the …
innocence. An alibi involves two parties: the owner, who benefits from the alibi, and the …
Computing elliptic curve discrete logarithms with improved baby-step giant-step algorithm
The negation map can be used to speed up the computation of elliptic curve discrete
logarithms using either the baby-step giant-step algorithm (BSGS) or Pollard rho …
logarithms using either the baby-step giant-step algorithm (BSGS) or Pollard rho …