reclaimID: Secure, self-sovereign identities using name systems and attribute-based encryption
M Schanzenbach, G Bramm… - 2018 17th IEEE …, 2018 - ieeexplore.ieee.org
In this paper we present reclaimID: An architecture that allows users to reclaim their digital
identities by securely sharing identity attributes without the need for a centralised service …
identities by securely sharing identity attributes without the need for a centralised service …
A censorship-resistant, privacy-enhancing and fully decentralized name system
M Wachs, M Schanzenbach, C Grothoff - Cryptology and Network Security …, 2014 - Springer
Abstract The Domain Name System (DNS) is vital for access to information on the Internet.
This makes it a target for attackers whose aim is to suppress free access to information. This …
This makes it a target for attackers whose aim is to suppress free access to information. This …
Splitting payments locally while routing interdimensionally
Abstract Payment Channel Networks (PCNs) enable fast, scalable, and cheap payments by
moving transactions off-chain, thereby overcoming debilitating drawbacks of blockchains …
moving transactions off-chain, thereby overcoming debilitating drawbacks of blockchains …
Anonymous addresses for efficient and resilient routing in f2f overlays
Friend-to-friend (F2F) overlays, which restrict direct communication to mutually trusted
parties, are a promising substrate for privacy-preserving communication due to their inherent …
parties, are a promising substrate for privacy-preserving communication due to their inherent …
Practical attacks against the I2P network
Anonymity networks, such as Tor or I2P, were built to allow users to access network
resources without revealing their identity. Newer designs, like I2P, run in a completely …
resources without revealing their identity. Newer designs, like I2P, run in a completely …
On the feasibility of a censorship resistant decentralized name system
M Wachs, M Schanzenbach, C Grothoff - International Symposium on …, 2013 - Springer
A central problem on the Internet today is that key infrastructure for security is concentrated
in a few places. This is particularly true in the areas of naming and public key infrastructure …
in a few places. This is particularly true in the areas of naming and public key infrastructure …
Greedy embedding, routing and content addressing for darknets
To achieve anonymous and censorship-resistant overlay communication, darknets restrict
overlay links to trusted parties. Efficient data retrieval in such a restricted topology requires a …
overlay links to trusted parties. Efficient data retrieval in such a restricted topology requires a …
Secure data sharing framework via hierarchical greedy embedding in darknets
Geometric routing, which combines greedy embedding and greedy forwarding, is a
promising approach for efficient data sharing in darknets. However, the security of data …
promising approach for efficient data sharing in darknets. However, the security of data …
Semi–supervised and compound classification of network traffic
This paper presents a new semi–supervised method to effectively improve traffic
classification performance when very few supervised training data are available. Existing …
classification performance when very few supervised training data are available. Existing …
Mitigating eclipse attacks in peer-to-peer networks
Peer-to-Peer (P2P) protocols usage is proliferating for a variety of applications including
time-and safety-critical ones. While the distributed design of P2P provides inherent fault …
time-and safety-critical ones. While the distributed design of P2P provides inherent fault …