Open Access Open Access  Restricted Access Subscription or Fee Access

A Secure Distributed Nymble for Blocking Misbehaving Users in Anonymizing Networks

N. Theja, T. Jayakumari

Abstract


Nymble is a system which provides a blocking mechanism to a server to protect it from misbehaving users without deanonymization while allowing anonymous access to behaving users. But, the earlier design for Nymble had a problem. The original design was based on an unrealistic assumption that the trusted third parties, Pseudonym Manager and Nymble Manage are not going to collude to identify the user. To eliminate this problem, Trusted Third Party(TTP) free anonymous blacklisting system was introduced. But, it degraded the performance of the system due to extensive amount of computation. Here, we are going to propose a distributed blacklisting anonymous system using a ring signature. We can easily prove that it is more efficient than TTP free anonymous system, collision resistant, scalable and robust. High performance is provided as a result of distributed architecture.

Keywords


Anonymity, Privacy, Anonymous Blacklisting System, Revocation, Authentication.

Full Text:

PDF

References


R. Dingledine, N. Mathewson, and P. Syverson. Tor: The Second Generation Onion Router. In Usenix Security Symposium, pages 303–320, Aug. 2004.

Patrick P. Tsang, Apu Kapadia, Cory Cornelius, and Sean W. Smith. Nymble: Blocking misbehaving users in anonymizing networks. IEEE Transactions on Dependable and Secure Computing, 99(1), 2011.

Patrick P. Tsang, Man Ho Au, Apu Kapadia, and Sean W. Smith. Blacklistable anonymous credentials: blocking misbehaving users without ttps. In CCS '07: Proceedings of the 14th ACM conference on Computer and communications security, pages 72–81, New York, NY, USA,2007. ACM.

Patrick P. Tsang, Man Ho Au, Apu Kapadia, and Sean W. Smith. Perea: towards practical ttp-free revocation in anonymous authentication. In CCS '08: Proceedings of the 15th ACM conference on Computer and communications security, pages 333–344, New York, NY, USA, 2008. ACM

G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik. A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. In CRYPTO, LNCS 1880, pages 255–270. Springer, 2000.

Nishanth Chandran, Jens Groth, and Amit Sahai. Ring signatures of sub-linear size without random oracles. In ICALP, pages 423–434, 2007.

Nishanth Chandran, Jens Groth, and Amit Sahai. Ring signatures of sub-linear size without random oracles. In ICALP, pages 423–434, 2007.

David Chaum. Blind signatures for untraceable payments. Advances in Cryptology - Cryptography, 82, 1982.

Chaum David and Vanheyst E. Group signatures. In Lecture notes in computer science, pages 257–265, 1991.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.