Entry Syta:2014:SAA from tissec.bib

Last update: Sun Oct 15 02:58:48 MDT 2017                Valid HTML 3.2!

Index sections

Top | Symbols | Numbers | Math | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

BibTeX entry

@Article{Syta:2014:SAA,
  author =       "Ewa Syta and Henry Corrigan-Gibbs and Shu-Chun Weng
                 and David Wolinsky and Bryan Ford and Aaron Johnson",
  title =        "Security Analysis of Accountable Anonymity in
                 {Dissent}",
  journal =      j-TISSEC,
  volume =       "17",
  number =       "1",
  pages =        "4:1--4:??",
  month =        aug,
  year =         "2014",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/2629621",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Mon Aug 11 19:17:17 MDT 2014",
  bibsource =    "http://portal.acm.org/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "Users often wish to communicate anonymously on the
                 Internet, for example, in group discussion or instant
                 messaging forums. Existing solutions are vulnerable to
                 misbehaving users, however, who may abuse their
                 anonymity to disrupt communication. Dining
                 Cryptographers Networks (DC-nets) leave groups
                 vulnerable to denial-of-service and Sybil attacks; mix
                 networks are difficult to protect against traffic
                 analysis; and accountable voting schemes are unsuited
                 to general anonymous messaging. Dissent is the first
                 general protocol offering provable anonymity and
                 accountability for moderate-size groups, while
                 efficiently handling unbalanced communication demands
                 among users. We present an improved and hardened
                 dissent protocol, define its precise security
                 properties, and offer rigorous proofs of these
                 properties. The improved protocol systematically
                 addresses the delicate balance between provably hiding
                 the identities of well-behaved users, while provably
                 revealing the identities of disruptive users, a
                 challenging task because many forms of misbehavior are
                 inherently undetectable. The new protocol also
                 addresses several nontrivial attacks on the original
                 dissent protocol stemming from subtle design flaws.",
  acknowledgement = ack-nhfb,
  articleno =    "4",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

Related entries