Entry Syta:2014:SAA from tissec.bib
Last update: Sun Oct 15 02:58:48 MDT 2017
Top |
Symbols |
Numbers |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Syta:2014:SAA,
author = "Ewa Syta and Henry Corrigan-Gibbs and Shu-Chun Weng
and David Wolinsky and Bryan Ford and Aaron Johnson",
title = "Security Analysis of Accountable Anonymity in
{Dissent}",
journal = j-TISSEC,
volume = "17",
number = "1",
pages = "4:1--4:??",
month = aug,
year = "2014",
CODEN = "ATISBQ",
DOI = "https://doi.org/10.1145/2629621",
ISSN = "1094-9224 (print), 1557-7406 (electronic)",
ISSN-L = "1094-9224",
bibdate = "Mon Aug 11 19:17:17 MDT 2014",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
http://www.math.utah.edu/pub/tex/bib/tissec.bib",
abstract = "Users often wish to communicate anonymously on the
Internet, for example, in group discussion or instant
messaging forums. Existing solutions are vulnerable to
misbehaving users, however, who may abuse their
anonymity to disrupt communication. Dining
Cryptographers Networks (DC-nets) leave groups
vulnerable to denial-of-service and Sybil attacks; mix
networks are difficult to protect against traffic
analysis; and accountable voting schemes are unsuited
to general anonymous messaging. Dissent is the first
general protocol offering provable anonymity and
accountability for moderate-size groups, while
efficiently handling unbalanced communication demands
among users. We present an improved and hardened
dissent protocol, define its precise security
properties, and offer rigorous proofs of these
properties. The improved protocol systematically
addresses the delicate balance between provably hiding
the identities of well-behaved users, while provably
revealing the identities of disruptive users, a
challenging task because many forms of misbehavior are
inherently undetectable. The new protocol also
addresses several nontrivial attacks on the original
dissent protocol stemming from subtle design flaws.",
acknowledgement = ack-nhfb,
articleno = "4",
fjournal = "ACM Transactions on Information and System Security",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J789",
}
Related entries
- abuse,
2(4)354
- accountability,
9(2)138,
18(1)2
- address,
2(1)65,
2(4)390,
10(2)8,
10(3)12,
11(1)4,
11(2)3,
11(3)12,
12(2)11,
13(3)22,
13(3)26,
13(4)31,
13(4)38,
13(4)40,
14(1)3,
15(1)2,
15(2)6,
15(2)8,
16(3)11,
16(4)14,
17(1)1,
17(1)2,
17(2)8,
17(3)11
- against,
2(3)230,
2(4)354,
2(4)416,
9(4)461,
10(3)11,
11(2)3,
11(3)13,
11(4)22,
12(3)18,
13(3)22,
13(3)28,
14(1)7,
14(1)13,
14(3)24,
15(1)3,
15(2)6,
15(2)8,
15(3)14,
16(1)1,
16(1)2,
16(2)8,
16(4)13,
17(2)7,
17(2)8,
18(1)2,
18(2)7
- analysis,
1(1)66,
2(1)34,
2(2)138,
2(3)230,
2(3)332,
4(1)1,
6(4)443,
7(2)175,
7(4)489,
8(3)312,
9(3)292,
9(4)391,
10(1)2,
10(3)9,
10(3)10,
10(3)11,
10(4)2,
10(4)6,
11(2)3,
11(3)13,
11(3)15,
11(4)17,
11(4)18,
11(4)23,
12(1)4,
12(2)10,
12(3)16,
13(1)10,
13(3)25,
13(3)26,
13(3)27,
13(4)41,
14(1)6,
14(1)8,
14(1)13,
14(2)15,
14(4)28,
15(3)14,
15(4)17,
15(4)18,
16(1)2,
16(1)4,
16(2)8,
16(3)10,
16(3)11,
16(4)14,
16(4)17,
17(1)1,
17(2)7,
17(3)9,
17(4)14,
18(1)1,
18(1)4,
18(2)6
- anonymity,
1(1)66,
2(3)230,
2(4)354,
2(4)390,
11(2)3,
11(2)6,
12(3)15,
13(2)13,
13(4)29,
13(4)39,
13(4)41,
14(1)4,
14(4)29,
15(1)5,
15(3)11,
15(3)12,
15(3)14
- anonymous,
3(2)63,
7(4)489,
11(2)3,
12(3)15,
12(4)21,
13(1)8,
13(4)39,
13(4)41,
14(1)4,
14(1)10,
14(4)29,
15(1)4,
15(1)5,
15(3)14,
17(3)10,
17(3)12
- anonymously,
13(4)39
- balance,
12(2)13,
17(3)11
- because,
1(1)66,
2(3)269,
10(4)5,
11(4)18,
11(4)21,
12(1)2,
12(2)10,
14(1)3,
14(4)29,
16(2)7,
17(1)1,
17(3)10
- challenging,
9(4)391,
10(4)3,
11(3)14,
12(1)2,
13(3)20,
13(3)27,
15(2)9
- communicate,
17(3)9
- communication,
4(3)289,
4(4)371,
7(4)523,
10(3)9,
10(4)6,
11(1)2,
11(2)2,
11(2)3,
11(3)14,
11(4)18,
12(1)2,
12(3)15,
12(3)16,
12(4)21,
12(4)22,
13(1)8,
13(4)29,
14(1)4,
14(1)12,
15(1)5,
15(2)6,
15(2)7,
15(2)9,
15(3)14,
16(3)10,
16(4)15,
17(3)9,
18(2)5,
18(2)7
- define,
1(1)26,
2(2)177,
10(1)3,
10(1)4,
10(2)8,
10(4)2,
10(4)5,
12(1)1,
12(3)19,
13(3)24,
13(3)27,
13(4)29,
13(4)36,
14(1)9,
14(1)14,
14(3)25,
16(1)4,
17(1)2
- demand,
12(2)13,
15(2)10,
18(2)5
- denial-of-service,
10(3)9,
15(3)11,
15(4)16
- design,
1(1)66,
2(1)34,
2(1)105,
2(2)138,
2(3)269,
2(4)390,
2(4)416,
10(2)7,
10(3)11,
10(4)1,
11(1)2,
11(2)1,
11(4)18,
11(4)23,
12(1)3,
12(2)8,
12(2)11,
12(3)17,
12(4)20,
12(4)22,
13(1)10,
13(4)29,
13(4)32,
14(1)8,
14(3)24,
15(3)13,
16(2)5,
16(2)6,
16(2)8,
16(4)16,
17(2)7,
17(2)8,
17(4)13,
18(1)1,
18(1)3,
18(4)12
- difficult,
11(2)2,
11(2)5,
11(3)15,
11(3)16,
13(3)28,
16(2)5,
17(3)12,
17(4)16,
18(3)9,
18(4)13
- discussion,
12(4)22
- disrupt,
10(4)6,
11(4)23
- disruptive,
14(3)27
- efficiently,
2(3)269,
10(4)2,
11(3)15,
12(4)20,
13(4)32,
16(4)17,
17(4)15,
18(1)4
- example,
10(4)5,
12(1)1,
12(2)11,
12(3)19,
12(4)20,
13(3)20,
13(4)30,
13(4)35,
13(4)39,
13(4)40,
15(2)10,
16(1)3,
16(2)5,
16(3)10,
17(1)2,
18(1)1,
18(2)8,
18(4)13
- existing,
1(1)93,
11(1)2,
11(3)15,
11(4)22,
11(4)23,
12(1)1,
12(1)2,
12(1)3,
12(2)12,
12(3)14,
13(3)27,
13(4)36,
14(1)13,
14(3)25,
14(4)30,
15(1)4,
15(2)9,
15(3)12,
16(2)5,
16(3)10,
16(4)15,
17(1)2,
17(2)5,
17(2)7,
17(4)15,
18(1)1,
18(3)10
- first,
2(1)34,
2(1)105,
2(4)354,
9(2)181,
10(4)6,
11(2)3,
11(2)4,
11(3)13,
11(4)18,
11(4)22,
12(1)3,
12(1)5,
12(3)18,
12(4)22,
13(4)31,
13(4)32,
14(1)13,
14(3)25,
14(4)30,
14(4)31,
15(4)17,
15(4)18,
16(3)10,
17(2)6,
17(3)11,
18(1)4,
18(3)9,
18(4)12,
18(4)13
- flaws.,
16(2)5
- form,
10(4)4,
11(4)17,
12(2)8,
16(4)17,
17(1)3
- general,
1(1)66,
2(1)65,
2(1)105,
2(2)159,
2(3)230,
2(3)269,
9(2)181,
9(4)391,
10(1)2,
10(4)1,
11(1)3,
12(1)2,
12(1)5,
12(3)18,
12(4)20,
13(3)28,
15(1)2,
15(3)13,
16(1)2,
16(1)4,
16(2)7,
17(1)3,
18(1)3,
18(3)10,
18(4)12
- group,
1(1)66,
2(4)354,
3(3)136,
4(3)289,
4(4)371,
6(4)547,
7(1)60,
7(3)457,
7(4)523,
10(3)10,
11(1)3,
11(4)18,
11(4)23,
12(1)4,
13(4)34,
14(1)4,
14(3)23,
14(4)28,
16(1)4
- hiding,
12(4)22
- however,
2(3)269,
10(2)5,
10(2)8,
11(2)6,
11(3)15,
11(4)18,
11(4)20,
11(4)22,
13(3)20,
13(3)22,
13(4)35,
13(4)38,
13(4)39,
14(1)14,
14(3)24,
14(4)28,
14(4)29,
15(2)10,
16(2)7,
16(3)11,
17(1)2,
17(3)12,
17(4)15,
18(1)1,
18(2)7,
18(4)13
- identity,
2(2)177,
2(4)390,
10(3)9,
11(2)6,
12(3)15,
13(4)36,
13(4)41,
14(1)10,
14(3)25,
14(4)29,
15(1)4,
15(3)12
- improved,
9(1)1,
9(4)461,
10(2)6,
11(2)1,
12(1)3,
13(4)29,
15(2)7,
17(1)1
- Internet,
2(3)332,
2(4)390,
7(2)242,
11(2)5,
12(2)13,
12(3)17,
13(4)38,
15(3)11,
17(3)12,
17(4)16
- Johnson, Aaron,
15(3)14
- leave,
11(2)3,
15(2)6
- many,
1(1)93,
2(1)65,
2(2)159,
2(3)332,
10(1)4,
10(4)1,
11(3)13,
11(4)22,
11(4)23,
12(1)2,
12(3)17,
12(3)18,
13(3)20,
13(3)22,
13(4)38,
13(4)39,
15(1)4,
15(2)6,
15(2)7,
16(2)5,
16(3)9,
16(4)17,
17(3)12,
18(1)1,
18(4)13
- may,
2(2)138,
2(2)177,
9(4)391,
10(3)12,
10(4)2,
11(2)2,
11(2)5,
11(3)12,
11(4)18,
11(4)21,
12(1)5,
12(2)8,
12(3)15,
12(3)16,
13(1)10,
13(3)22,
13(3)25,
13(4)35,
13(4)38,
13(4)40,
15(2)10,
16(1)4,
17(1)2,
18(1)1,
18(2)5
- messaging,
13(4)31
- misbehaving,
13(4)39,
14(4)29
- misbehavior,
11(4)19,
13(4)39,
14(4)29,
17(4)15,
18(1)2
- mix,
10(2)6,
14(1)7
- new,
1(1)3,
1(1)93,
2(1)105,
2(2)138,
2(3)295,
9(2)181,
9(4)461,
10(1)3,
10(2)6,
10(4)6,
11(4)17,
12(1)2,
12(1)3,
12(2)11,
12(3)14,
12(3)15,
12(3)16,
12(4)21,
12(4)22,
13(2)15,
13(4)29,
13(4)34,
14(1)4,
14(1)5,
14(1)6,
14(1)13,
14(3)23,
14(3)27,
14(4)30,
15(1)3,
15(2)7,
15(2)9,
15(2)10,
15(3)12,
15(4)15,
16(2)5,
16(2)7,
16(3)12,
16(4)16,
16(4)17,
17(2)7,
17(3)10,
17(4)15,
18(1)1,
18(1)2,
18(3)10,
18(3)11
- nontrivial,
12(4)20,
13(1)10,
14(1)10
- of-service, denial-,
10(3)9,
15(3)11,
15(4)16
- offer,
1(1)93,
9(4)461,
10(4)1,
10(4)6,
12(1)3,
13(4)29,
13(4)31,
16(2)7,
18(1)3
- often,
2(1)65,
10(1)4,
10(2)8,
10(3)10,
10(3)12,
11(1)2,
11(3)12,
11(4)20,
16(2)5,
17(1)2
- original,
9(4)461,
10(4)2,
11(4)17,
12(3)16,
13(3)25,
14(1)12,
14(3)25,
15(3)12
- precise,
9(4)391,
11(3)13,
14(1)3,
18(1)4
- present,
1(1)26,
2(1)3,
2(1)65,
2(2)177,
2(3)230,
2(3)269,
2(3)295,
2(4)354,
7(2)319,
9(2)181,
9(4)461,
10(1)2,
10(2)7,
10(3)10,
10(3)11,
10(3)12,
10(4)2,
10(4)3,
11(1)2,
11(1)4,
11(2)2,
11(2)5,
11(3)14,
11(4)22,
12(1)2,
12(1)4,
12(2)10,
12(2)11,
12(3)14,
12(3)15,
12(3)16,
12(3)17,
12(4)22,
13(1)10,
13(3)20,
13(3)22,
13(3)25,
13(3)28,
13(4)29,
13(4)41,
14(1)4,
14(1)5,
14(1)6,
15(1)2,
15(2)6,
15(2)8,
15(2)10,
15(3)12,
15(3)13,
15(4)16,
15(4)18,
16(2)6,
16(2)7,
16(4)13,
16(4)14,
17(2)6,
17(2)7,
17(2)8,
17(3)9,
17(3)12,
17(4)14,
17(4)15,
17(4)16,
18(1)3,
18(1)4,
18(2)7,
18(3)9,
18(3)10,
18(3)11,
18(4)12,
18(4)14
- proof,
1(1)93,
2(3)230,
2(3)332,
2(4)354,
9(2)181,
10(2)6,
11(3)13,
12(1)3,
12(2)8,
13(3)20,
13(3)25,
14(1)12,
15(1)4,
17(4)15,
18(1)4,
18(2)8
- property,
1(1)66,
1(1)93,
2(1)34,
2(2)177,
9(4)391,
10(1)2,
10(2)7,
10(2)8,
10(3)9,
11(1)2,
11(3)12,
11(3)13,
12(1)2,
12(1)3,
12(2)8,
12(2)9,
12(3)14,
12(3)18,
12(3)19,
12(4)21,
13(3)26,
13(4)41,
14(2)16,
15(1)4,
15(2)9,
15(2)10,
15(3)14,
15(4)18,
16(1)3,
16(2)5,
17(1)3,
18(1)3,
18(2)6,
18(2)8,
18(4)12
- protect,
2(3)332,
11(1)3,
12(3)15,
13(3)22,
13(3)28,
13(4)32,
15(4)18,
16(1)1,
16(2)6,
17(3)10,
18(1)1
- provable,
14(1)12,
17(4)15
- provably,
7(2)206,
10(3)10,
11(2)4,
11(3)13,
12(3)18,
12(3)19,
12(4)21,
13(3)21,
13(4)29,
16(4)15
- revealing,
2(4)390,
11(2)6,
12(1)6,
12(3)15,
16(3)12
- rigorous,
11(3)13,
16(2)8
- schemes,
3(3)161,
9(1)1,
9(4)461,
10(4)4,
10(4)5,
11(2)1,
11(2)4,
11(2)5,
11(3)15,
11(4)22,
12(1)2,
12(1)3,
12(2)8,
12(3)18,
13(3)25,
13(4)39,
14(1)14,
14(4)29,
15(2)9,
17(2)6,
17(4)15,
18(3)10
- service, denial-of-,
10(3)9,
15(3)11,
15(4)16
- several,
1(1)93,
2(1)65,
2(2)138,
2(3)230,
2(3)295,
10(1)2,
10(1)4,
10(2)6,
10(2)7,
10(3)12,
10(4)6,
11(1)4,
11(2)4,
11(4)17,
12(2)8,
12(4)20,
13(3)27,
13(4)30,
13(4)39,
13(4)41,
14(3)27,
14(4)29,
14(4)31,
15(2)6,
15(2)10,
16(3)12,
17(3)9,
17(3)10,
18(1)1
- solution,
9(2)162,
10(4)1,
11(1)2,
11(1)4,
11(4)20,
12(1)3,
12(1)6,
12(3)16,
12(3)18,
12(4)21,
13(3)22,
13(3)25,
13(3)27,
13(3)28,
15(2)7,
16(2)6,
16(3)11,
17(3)9,
17(3)10,
17(3)11,
18(1)1,
18(1)3
- subtle,
12(4)22,
16(4)13
- systematically,
17(2)7
- task,
2(1)65,
2(3)295,
9(4)391,
10(2)5,
11(4)23,
12(3)14,
12(4)20,
13(3)20,
13(3)27,
15(2)9,
15(3)13,
16(3)11
- traffic,
2(3)269,
10(2)8,
11(2)2,
11(2)3,
11(3)14,
12(2)13,
12(4)22,
15(2)6,
15(4)16
- voting,
2(4)354,
11(4)22,
13(2)16,
14(1)4,
14(2)18,
18(1)3
- vulnerable,
10(3)11,
10(4)5,
10(4)6,
11(3)15,
11(4)22,
12(2)11,
13(1)10,
13(3)25,
14(3)24,
14(3)27,
15(4)16,
16(4)13
- while,
2(3)230,
2(4)354,
9(4)391,
9(4)421,
9(4)461,
10(2)5,
10(4)2,
11(1)4,
11(2)2,
11(2)6,
11(4)18,
11(4)19,
11(4)22,
12(2)9,
12(3)16,
13(1)5,
13(3)22,
13(3)25,
13(4)39,
13(4)41,
14(3)25,
14(3)26,
14(4)31,
15(3)12,
15(4)15,
15(4)17,
16(3)9,
16(3)12,
16(4)16,
17(3)9,
17(4)15,
18(1)1,
18(2)7
- who,
1(1)26,
1(1)66,
10(4)3,
11(3)12,
11(4)19,
11(4)23,
12(1)2,
12(2)9,
13(4)39,
13(4)40,
15(3)14,
16(2)8,
18(4)13
- wish,
10(4)3,
12(2)9