

A Secure Distributed Nymble for Blocking Misbehaving Users in Anonymizing Networks
Abstract
Keywords
References
R. Dingledine, N. Mathewson, and P. Syverson. Tor: The Second Generation Onion Router. In Usenix Security Symposium, pages 303–320, Aug. 2004.
Patrick P. Tsang, Apu Kapadia, Cory Cornelius, and Sean W. Smith. Nymble: Blocking misbehaving users in anonymizing networks. IEEE Transactions on Dependable and Secure Computing, 99(1), 2011.
Patrick P. Tsang, Man Ho Au, Apu Kapadia, and Sean W. Smith. Blacklistable anonymous credentials: blocking misbehaving users without ttps. In CCS '07: Proceedings of the 14th ACM conference on Computer and communications security, pages 72–81, New York, NY, USA,2007. ACM.
Patrick P. Tsang, Man Ho Au, Apu Kapadia, and Sean W. Smith. Perea: towards practical ttp-free revocation in anonymous authentication. In CCS '08: Proceedings of the 15th ACM conference on Computer and communications security, pages 333–344, New York, NY, USA, 2008. ACM
G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik. A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. In CRYPTO, LNCS 1880, pages 255–270. Springer, 2000.
Nishanth Chandran, Jens Groth, and Amit Sahai. Ring signatures of sub-linear size without random oracles. In ICALP, pages 423–434, 2007.
Nishanth Chandran, Jens Groth, and Amit Sahai. Ring signatures of sub-linear size without random oracles. In ICALP, pages 423–434, 2007.
David Chaum. Blind signatures for untraceable payments. Advances in Cryptology - Cryptography, 82, 1982.
Chaum David and Vanheyst E. Group signatures. In Lecture notes in computer science, pages 257–265, 1991.
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 3.0 License.