From Bounded to Unbounded: Privacy Amplification via Shuffling with Dummies

S Takagi, F Kato, Y Cao… - 2023 IEEE 36th …, 2023 - ieeexplore.ieee.org
In recent years, the shuffling model has been garnering attention in the realm of differential
privacy (DP). This study focuses on the fact that the shuffling model follows bounded DP …

Reactive key-loss protection in blockchains

S Blackshear, K Chalkias, P Chatzigiannis… - … Cryptography and Data …, 2021 - Springer
We present a novel approach for blockchain asset owners to reclaim their funds in case of
accidental private-key loss or transfer to a mistyped address. Our solution can be deployed …

Mitigating Intersection Attacks in Anonymous Microblogging

S Gaballah, THL Nguyen, L Abdullah… - Proceedings of the 18th …, 2023 - dl.acm.org
Anonymous microblogging systems are known to be vulnerable to intersection attacks due
to network churn. An adversary that monitors all communications can leverage the churn to …

On the effectiveness of intersection attacks in anonymous microblogging

SA Gaballah, L Abdullah, MT Tran, E Zimmer… - Nordic Conference on …, 2022 - Springer
Intersection attacks, which are popular traffic analysis attacks, have been extensively studied
in anonymous point-to-point communication scenarios. These attacks are also known to be …

T0RTT: non-interactive immediate forward-secret single-pass circuit construction

S Lauer, K Gellert, R Merget, T Handirk… - Cryptology ePrint …, 2019 - eprint.iacr.org
Maintaining privacy on the Internet with the presence of powerful adversaries such as nation-
state attackers is a challenging topic, and the Tor project is currently the most important tool …

Asymmetric DCnets for Effective and Efficient Sender Anonymity

T Grube, J Daubert… - 2018 IEEE Global …, 2018 - ieeexplore.ieee.org
Emerging connected devices lead to ubiquitous communication in which anonymity and
efficiency gain additional importance. In this paper, we show that current measures for …

[PDF][PDF] Construction and security analysis of 0-RTT protocols

K Gellert - 2020 - scholar.archive.org
If two parties want to communicate over an insecure channel, they typically execute an
interactive cryptographic handshake to establish a shared secret, before any application …

ADTM: an Anonymous Data Transmission Model based on Multiple Oblivious Internet Channels

C Zhang, N Hu, X Cheng, Y Zhao - Proceedings of the 2020 International …, 2020 - dl.acm.org
Traditional VPN-based data transmission schemes are facing the threat of malicious tracking
and blocking. Moreover, most of the anonymous communication networks, such as Tor, can …

On the Effectiveness of Intersection Attacks in Anonymous Microblogging

E Zimmer, M Mühlhäuser - Secure IT Systems: 27th Nordic …, 2023 - books.google.com
Intersection attacks, which are popular traffic analysis attacks, have been extensively studied
in anonymous point-to-point communication scenarios. These attacks are also known to be …

Extending Tor to Achieve Recipient Anonymity

F BUCCAFURRI, V De Angelis, S Lazzaro - Available at SSRN 4482087 - papers.ssrn.com
Tor is a well-known routing protocol implementing the Onion multi-layered encryption to
achieve communication anonymity. Among other possible attacks, Tor is vulnerable to …