2012
DOI: 10.1007/978-3-642-27576-0_22
|View full text |Cite
|
Sign up to set email alerts
|

BNymble: More Anonymous Blacklisting at Almost No Cost (A Short Paper)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 8 publications
0
7
0
Order By: Relevance
“…A different approach is taken by Nymble-like systems [36,19,18,26], which also rely on a trusted third party. The user obtains a pseudonym, a "nymble", from the trusted third party which is only valid for a certain time frame with one server.…”
Section: Membership Proofs Andmentioning
confidence: 99%
“…A different approach is taken by Nymble-like systems [36,19,18,26], which also rely on a trusted third party. The user obtains a pseudonym, a "nymble", from the trusted third party which is only valid for a certain time frame with one server.…”
Section: Membership Proofs Andmentioning
confidence: 99%
“…We especially focused on the category of Nymble-like systems, since this relatively new approach to anonymous blacklisting systems has recently received a lot of attention from the research community. We believe that new schemes in this class are likely to be proposed in the near future (indeed, Lofgren and Hopper's BNymble [33] was accepted for publication just days before the submission of this paper) and we hope that our definitions and observations will assist in these endeavours. We conclude by discussing some open research problems in anonymous blacklisting.…”
Section: Discussionmentioning
confidence: 97%
“…Recently, Lofgren and Hopper proposed BNymble (i.e., Blinded Nymble) [33], which modifies the original Nymble design only slightly in order to satisfy the strong ZKverinym property. Similar to Jack and Nym, BNymble replaces pseudonyms based deterministically on users' IP addresses with blind RSA signatures on user-chosen randomness.…”
Section: Definition 14 ((Strong) Zk-verinym)mentioning
confidence: 99%
“…It should be carefully chosen to provide a good balance between privacy (if U learns a verinym, she can recognize blacklist entries corresponding to past owners of her unique resource) and functionality (the number of linkability windows determines the maximum duration of an inter-window revocation). 8 This is not possible in schemes like Jack [23] and BNymble [24] that base verinyms on user-chosen randomness; this seems to be an inherent limitation that comes with the unconditional unlinkability of such verinyms. Of course, these schemes could be adapted to use the approach of this section by sacrificing unconditional unlinkability in exchange for computational unlinkability with an honest-majority assumption using, e.g., our (t, n)-threshold verinym construction.…”
Section: Long-term Revocationmentioning
confidence: 99%
“…Since Nymble was first proposed in 2006, several schemes have appeared in the literature to solve the same problem, or one of several closely related problems. (For some examples, see [6], [20], [21], [23], [24], [33]- [35].) Three of these schemes operate within the same general framework as Nymble; they change only low-level details to weaken trust assumptions and to provide stronger privacy guarantees and some new functionality.…”
Section: Introductionmentioning
confidence: 99%