Do you see what I see? differential treatment of anonymous users

S Khattak, D Fifield, S Afroz, M Javed, S Sundaresan… - 2016 - discovery.ucl.ac.uk
The utility of anonymous communication is undermined by a growing number of websites
treating users of such services in a degraded fashion. The second-class treatment of …

Zero-knowledge argument for polynomial evaluation with application to blacklists

S Bayer, J Groth - Advances in Cryptology–EUROCRYPT 2013: 32nd …, 2013 - Springer
Verification of a polynomial's evaluation in a secret committed value plays a role in
cryptographic applications such as non-membership or membership proofs. We construct a …

[PDF][PDF] BLACR: TTP-Free Blacklistable Anonymous Credentials with Reputation.

MH Au, A Kapadia, W Susilo - NDSS, 2012 - cs.indiana.edu
Anonymous authentication can give users the license to misbehave since there is no fear of
retribution. As a deterrent or means to revocation, various schemes for accountable …

Formalizing anonymous blacklisting systems

R Henry, I Goldberg - 2011 IEEE Symposium on Security and …, 2011 - ieeexplore.ieee.org
Anonymous communications networks, such as Tor, help to solve the real and important
problem of enabling users to communicate privately over the Internet. However, in doing so …

Computing small discrete logarithms faster

DJ Bernstein, T Lange - Progress in Cryptology-INDOCRYPT 2012: 13th …, 2012 - Springer
Computations of small discrete logarithms are feasible even in “secure” groups, and are
used as subroutines in several cryptographic protocols in the literature. For example, the …

Anon-pass: Practical anonymous subscriptions

MZ Lee, AM Dunn, B Waters… - 2013 IEEE symposium …, 2013 - ieeexplore.ieee.org
We present the design, security proof, and implementation of an anonymous subscription
service. Users register for the service by providing some form of identity, which might or …

PERM: Practical reputation-based blacklisting without TTPs

MH Au, A Kapadia - Proceedings of the 2012 ACM conference on …, 2012 - dl.acm.org
Some users may misbehave under the cover of anonymity by, eg, defacing webpages on
Wikipedia or posting vulgar comments on YouTube. To prevent such abuse, a few …

Privacy enhancing technologies implementation: An Investigation of its impact on work processes and employee perception

MF Gan, HN Chua, SF Wong - Telematics and Informatics, 2019 - Elsevier
With increasing consumer awareness towards information privacy and government-enforced
regulations on data protection, organizations are implementing Privacy Enhancing …

Privacy-preserving alibi systems

B Davis, H Chen, M Franklin - Proceedings of the 7th ACM Symposium …, 2012 - dl.acm.org
An alibi provides evidence of a person's past location and can be critical in proving ones
innocence. An alibi involves two parties: the owner, who benefits from the alibi, and the …

Computing elliptic curve discrete logarithms with improved baby-step giant-step algorithm

SD Galbraith, P Wang, F Zhang - Cryptology ePrint Archive, 2015 - eprint.iacr.org
The negation map can be used to speed up the computation of elliptic curve discrete
logarithms using either the baby-step giant-step algorithm (BSGS) or Pollard rho …