Systematizing decentralization and privacy: Lessons from 15 years of research and deployments

C Troncoso, M Isaakidis, G Danezis… - arXiv preprint arXiv …, 2017 - arxiv.org
Decentralized systems are a subset of distributed systems where multiple authorities control
different components and no authority is fully trusted by all. This implies that any component …

Independent mix zone for location privacy in vehicular networks

N Guo, L Ma, T Gao - IEEE Access, 2018 - ieeexplore.ieee.org
The sensitive information of vehicles is related to location in vehicular networks. Pseudonym
change is an effective way to protect the location privacy of vehicles, which is to establish a …

Do you see what I see? differential treatment of anonymous users

S Khattak, D Fifield, S Afroz, M Javed, S Sundaresan… - 2016 - discovery.ucl.ac.uk
The utility of anonymous communication is undermined by a growing number of websites
treating users of such services in a degraded fashion. The second-class treatment of …

Scalable revocation scheme for anonymous credentials based on n-times unlinkable proofs

J Camenisch, M Drijvers, J Hajny - Proceedings of the 2016 ACM on …, 2016 - dl.acm.org
We propose the first verifier-local revocation scheme for privacy-enhancing attribute-based
credentials (PABCs) that is practically usable in large-scale applications, such as national …

Using Range-Revocable Pseudonyms to Provide Backward Unlinkability in the Edge

C Correia, M Correia, L Rodrigues - Proceedings of the 2023 ACM …, 2023 - dl.acm.org
In this paper we propose a novel abstraction that we have named Range-Revocable
Pseudonyms (RRPs). RRPs are a new class of pseudonyms whose validity can be revoked …

Derecho: Privacy pools with proof-carrying disclosures

J Beal, B Fisch - Cryptology ePrint Archive, 2023 - eprint.iacr.org
A privacy pool enables clients to deposit units of a cryptocurrency into a shared pool where
ownership of deposited currency is tracked via a system of cryptographically hidden records …

Zero-knowledge argument for polynomial evaluation with application to blacklists

S Bayer, J Groth - Advances in Cryptology–EUROCRYPT 2013: 32nd …, 2013 - Springer
Verification of a polynomial's evaluation in a secret committed value plays a role in
cryptographic applications such as non-membership or membership proofs. We construct a …

BLACR: TTP-free blacklistable anonymous credentials with reputation

MH Au, A Kapadia, W Susilo - 2012 - ro.uow.edu.au
Anonymous authentication can give users the license to misbehave since there is no fear of
retribution. As a deterrent, or means to revocation, various schemes for accountable …

BoDMaS: bio-inspired selfishness detection and mitigation in data management for ad-hoc social networks

AM Ahmed, X Kong, L Liu, F Xia, S Abolfazli, Z Sanaei… - Ad Hoc Networks, 2017 - Elsevier
Existing data management protocols for socially-aware networks assume that users are
cooperative when participating in operations such as data forwarding. However, selfishness …

Formalizing anonymous blacklisting systems

R Henry, I Goldberg - 2011 IEEE Symposium on Security and …, 2011 - ieeexplore.ieee.org
Anonymous communications networks, such as Tor, help to solve the real and important
problem of enabling users to communicate privately over the Internet. However, in doing so …