Systematizing decentralization and privacy: Lessons from 15 years of research and deployments
Decentralized systems are a subset of distributed systems where multiple authorities control
different components and no authority is fully trusted by all. This implies that any component …
different components and no authority is fully trusted by all. This implies that any component …
Independent mix zone for location privacy in vehicular networks
N Guo, L Ma, T Gao - IEEE Access, 2018 - ieeexplore.ieee.org
The sensitive information of vehicles is related to location in vehicular networks. Pseudonym
change is an effective way to protect the location privacy of vehicles, which is to establish a …
change is an effective way to protect the location privacy of vehicles, which is to establish a …
Do you see what I see? differential treatment of anonymous users
S Khattak, D Fifield, S Afroz, M Javed, S Sundaresan… - 2016 - discovery.ucl.ac.uk
The utility of anonymous communication is undermined by a growing number of websites
treating users of such services in a degraded fashion. The second-class treatment of …
treating users of such services in a degraded fashion. The second-class treatment of …
Derecho: privacy pools with proof-carrying disclosures
J Beal, B Fisch - Proceedings of the 2024 on ACM SIGSAC Conference …, 2024 - dl.acm.org
A privacy pool enables clients to deposit units of a cryptocurrency into a shared pool where
ownership of deposited currency is tracked via a system of cryptographically hidden records …
ownership of deposited currency is tracked via a system of cryptographically hidden records …
Scalable revocation scheme for anonymous credentials based on n-times unlinkable proofs
We propose the first verifier-local revocation scheme for privacy-enhancing attribute-based
credentials (PABCs) that is practically usable in large-scale applications, such as national …
credentials (PABCs) that is practically usable in large-scale applications, such as national …
Using Range-Revocable Pseudonyms to Provide Backward Unlinkability in the Edge
In this paper we propose a novel abstraction that we have named Range-Revocable
Pseudonyms (RRPs). RRPs are a new class of pseudonyms whose validity can be revoked …
Pseudonyms (RRPs). RRPs are a new class of pseudonyms whose validity can be revoked …
Zero-knowledge argument for polynomial evaluation with application to blacklists
S Bayer, J Groth - Advances in Cryptology–EUROCRYPT 2013: 32nd …, 2013 - Springer
Verification of a polynomial's evaluation in a secret committed value plays a role in
cryptographic applications such as non-membership or membership proofs. We construct a …
cryptographic applications such as non-membership or membership proofs. We construct a …
Snarkblock: Federated anonymous blocklisting from hidden common input aggregate proofs
Zero-knowledge blocklists allow cross-platform blocking of users but, counter-intuitively, do
not link users identities inter-or intra-platform, or to the fact they were blocked. Unfortunately …
not link users identities inter-or intra-platform, or to the fact they were blocked. Unfortunately …
BoDMaS: bio-inspired selfishness detection and mitigation in data management for ad-hoc social networks
Existing data management protocols for socially-aware networks assume that users are
cooperative when participating in operations such as data forwarding. However, selfishness …
cooperative when participating in operations such as data forwarding. However, selfishness …
Formalizing anonymous blacklisting systems
R Henry, I Goldberg - 2011 IEEE Symposium on Security and …, 2011 - ieeexplore.ieee.org
Anonymous communications networks, such as Tor, help to solve the real and important
problem of enabling users to communicate privately over the Internet. However, in doing so …
problem of enabling users to communicate privately over the Internet. However, in doing so …