Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Sebastian Meiser"'
Publikováno v:
The Journal of Privacy and Confidentiality, Vol 7, Iss 2 (2017)
Anonymous communication (AC) protocols such as the widely used Tor network have been designed to provide anonymity over the Internet to their participating users. While AC protocols have been the subject of several security and anonymity analyses in
Externí odkaz:
https://doaj.org/article/f56993427ab645c8b9b746aacba933ba
Publikováno v:
Proceedings on Privacy Enhancing Technologies, Vol 2020, Iss 3, Pp 356-383 (2020)
For anonymous communication networks (ACNs), Das et al. recently confirmed a long-suspected trilemma result that ACNs cannot achieve strong anonymity, low latency overhead and low bandwidth overhead at the same time. Our paper emanates from the caref
Autor:
Sebastian Meiser, Dominique Schröder
Publikováno v:
IET Information Security. 12:194-206
The authors introduce delegatable functional signatures (DFS) which support the delegation of signing capabilities to another party, called the evaluator, with respect to a functionality F . In a DFS, the signer of a message can choose an evaluator,
Publikováno v:
Proceedings on Privacy Enhancing Technologies, 2019 (2)
Proceedings on Privacy Enhancing Technologies, Vol 2019, Iss 2, Pp 245-269 (2019)
Proceedings on Privacy Enhancing Technologies, Vol 2019, Iss 2, Pp 245-269 (2019)
Proceedings on Privacy Enhancing Technologies, 2019 (2)
ISSN:2299-0984
ISSN:2299-0984
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3a7578af354d18308b43eb5bc8dde942
https://hdl.handle.net/20.500.11850/359450
https://hdl.handle.net/20.500.11850/359450
Publikováno v:
Proceedings on Privacy Enhancing Technologies. 2016:40-60
In this paper, we present a rigorous methodology for quantifying the anonymity provided by Tor against a variety of structural attacks, i.e., adversaries that corrupt Tor nodes and thereby perform eavesdropping attacks to deanonymize Tor users. First
Publikováno v:
CCS
Computing differential privacy guarantees is an important task for a wide variety of applications. The tighter the guarantees are, the more difficult it seems to be to compute them: naive bounds are simple additions, whereas modern composition theore
Autor:
Esfandiar Mohammadi, Sebastian Meiser
Publikováno v:
CCS
Many applications, such as anonymous communication systems, privacy-enhancing database queries, or privacy-enhancing machine-learning methods, require robust guarantees under thousands and sometimes millions of observations. The notion of r-fold appr
Publikováno v:
IEEE Symposium on Security and Privacy
This work investigates the fundamental constraints of anonymous communication (AC) protocols. We analyze the relationship between bandwidth overhead, latency overhead, and sender anonymity or recipient anonymity against the global passive (network-le
Publikováno v:
Public-Key Cryptography – PKC 2016 ISBN: 9783662493830
Public Key Cryptography (1)
Public Key Cryptography (1)
We introduce delegatable functional signatures DFS which support the delegation of signing capabilities to another party, called the evaluator, with respect to a functionality $$\mathcal {F} $$F. In a DFS, the signer of a message can choose an evalua
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a02b5552dda16a9adc0d80d6f3e3221b
https://doi.org/10.1007/978-3-662-49384-7_14
https://doi.org/10.1007/978-3-662-49384-7_14
Publikováno v:
ACM Conference on Computer and Communications Security
Recently, the live-monitor MATor for formally analyzing user anonymity within the Tor network has been proposed (CCS'14). However, this monitor only considers adversaries that compromise part of the Tor network itself, not Internet infrastructural ad