Zobrazeno 1 - 10
of 78
pro vyhledávání: '"Aniket Kate"'
Publikováno v:
The Journal of Privacy and Confidentiality, Vol 7, Iss 2 (2017)
Anonymous communication (AC) protocols such as the widely used Tor network have been designed to provide anonymity over the Internet to their participating users. While AC protocols have been the subject of several security and anonymity analyses in
Externí odkaz:
https://doaj.org/article/f56993427ab645c8b9b746aacba933ba
Autor:
Donghang Lu, Aniket Kate
Publikováno v:
Proceedings on Privacy Enhancing Technologies. 2023:347-360
This work presents RPM, a scalable anonymous communication protocol suite using secure multiparty computation (MPC) with the offline-online model. We generate random, unknown permutation matrices in a secret-shared fashion and achieve improved (onlin
Publikováno v:
Proceedings on Privacy Enhancing Technologies. 2022:582-605
There is a growing demand for network-level anonymity for delegates at global organizations such as the UN and Red Cross. Numerous anonymous communication (AC) systems have been proposed over the last few decades to provide anonymity over the interne
Publikováno v:
Proceedings 2023 Network and Distributed System Security Symposium.
Publikováno v:
Proceedings 2023 Network and Distributed System Security Symposium.
While much research focuses on different methods to secure blockchain, information on the chain needs to be accessed by end-users to be useful. This position paper surveys different ways that end-users may access blockchains. We observe that between
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::58fb1c65a8aa43a2ed5739e25b9f6163
http://arxiv.org/abs/2212.03383
http://arxiv.org/abs/2212.03383
Publikováno v:
Proceedings on Privacy Enhancing Technologies, Vol 2022, Iss 1, Pp 396-416 (2022)
While the practicality of secure multi-party computation (MPC) has been extensively analyzed and improved over the past decade, we are hitting the limits of efficiency with the traditional approaches of representing the computed functionalities as ge
Publikováno v:
Proceedings on Privacy Enhancing Technologies, Vol 2020, Iss 3, Pp 356-383 (2020)
For anonymous communication networks (ACNs), Das et al. recently confirmed a long-suspected trilemma result that ACNs cannot achieve strong anonymity, low latency overhead and low bandwidth overhead at the same time. Our paper emanates from the caref
Publikováno v:
Proceedings on Privacy Enhancing Technologies, Vol 2020, Iss 3, Pp 404-424 (2020)
Cryptocurrencies play a major role in the global financial ecosystem. Their presence across different geopolitical corridors, including in repressive regimes, has been one of their striking features. In this work, we leverage this feature for bootstr
Publikováno v:
Proceedings on Privacy Enhancing Technologies. 2020:519-536
The Bitcoin network has offered a new way of securely performing financial transactions over the insecure network. Nevertheless, this ability comes with the cost of storing a large (distributed) ledger, which has become unsuitable for personal device