Nymbler: Privacy-enhanced Protection from Abuses of Anonymity

作者: Ryan Henry

DOI:

关键词:

摘要: Anonymous communications networks help to solve the real and important problem of enabling users communicate privately over Internet. However, by doing so, they also introduce an entirely new problem: How can service providers on Internet—such as websites, IRC mail servers—allow anonymous access while protecting themselves against abuse misbehaving users? Recent research efforts have focused using blacklisting systems (also known revocation systems) this problem. As opposed revocable anonymity systems, which enable some trusted third party deanonymize users, provide a way for authenticate anonymously with provider, provider revoke from individual without revealing their identities. The literature contains several many are impractical real-world deployment. In 2006, however, Tsang et al. proposed Nymble, solves very efficiently parties. Nymble has inspired number subsequent systems. Some these use fundamentally different approaches accomplish what does parties at all; so far, proposals all suffered serious performance scalability problems. Other build framework reduce Nymble’s trust assumptions maintaining its highly efficient design. primary contribution thesis is system built framework—a nimbler version Nymble—called Nymbler. We propose enhancements that facilitate construction scheme minimizes in then set security privacy properties should possess protect: 1) users’ malicious (including other users), 2) users. requirements meet maximize potential adoption, formally define optional features literature. present Nymbler, improves existing Nymble-like reducing level placed parties, simultaneously providing stronger guarantees functionality. It avoids dependence hardware unreasonable about non-collusion between implemented key components our measurements indicate practical. Our open problems literature, makes cryptographic constructions likely be independent theoretical interest.

参考文章(66)
Jan Camenisch, Markus Michels, Proving in zero-knowledge that a number is the product of two safe primes theory and application of cryptographic techniques. pp. 107- 122 ,(1999) , 10.1007/3-540-48910-X_8
Kevin Henry, Ian Goldberg, Ryan Henry, Making a Nymbler Nymble using VERBS (Extended Version) ,(2010)
Paul F. Syverson, Stuart G. Stubblebine, David M. Goldschlag, Unlinkable Serial Transactions financial cryptography. pp. 39- 56 ,(1997) , 10.1007/3-540-63594-7_66
Fabrice Boudot, Efficient proofs that a committed number lies in an interval theory and application of cryptographic techniques. pp. 431- 444 ,(2000) , 10.1007/3-540-45539-6_31
Stefan Brands, Rethinking Public Key Infrastructures and Digital Certificates Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy. pp. 305- 305 ,(2000) , 10.7551/MITPRESS/5931.001.0001
Stefan Brands, Restrictive binding of secret-key certificates theory and application of cryptographic techniques. pp. 231- 247 ,(1995) , 10.1007/3-540-49264-X_19
Carl Pomerance, The quadratic sieve factoring algorithm theory and application of cryptographic techniques. pp. 169- 182 ,(1985) , 10.1007/3-540-39757-4_17
Ryan Henry, Kevin Henry, Ian Goldberg, Making a nymbler nymble using VERBS privacy enhancing technologies. pp. 111- 129 ,(2010) , 10.1007/978-3-642-14527-8_7
Peter C. Johnson, Apu Kapadia, Patrick P. Tsang, Sean W. Smith, Nymble: anonymous IP-address blocking privacy enhancing technologies. pp. 113- 133 ,(2007) , 10.1007/978-3-540-75551-7_8
John R. Douceur, The Sybil Attack international workshop on peer to peer systems. pp. 251- 260 ,(2002) , 10.1007/3-540-45748-8_24