2016
DOI: 10.1007/s10207-016-0318-0
|View full text |Cite
|
Sign up to set email alerts
|

Broadcast anonymous routing (BAR): scalable real-time anonymous communication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
17
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 18 publications
(17 citation statements)
references
References 24 publications
0
17
0
Order By: Relevance
“…The proposed anonymous online evaluation protocol is based on known privacy primitives such as blind signatures [22], hash chains [23] and broadcast anonymous communication channels [24]. The protocol consists of four entities: the Student (or Evaluator) S, the Issuing Authority Server I, the Lecturer Server L and the Questionnaire Server Q.…”
Section: Protocol Descriptionmentioning
confidence: 99%
See 1 more Smart Citation
“…The proposed anonymous online evaluation protocol is based on known privacy primitives such as blind signatures [22], hash chains [23] and broadcast anonymous communication channels [24]. The protocol consists of four entities: the Student (or Evaluator) S, the Issuing Authority Server I, the Lecturer Server L and the Questionnaire Server Q.…”
Section: Protocol Descriptionmentioning
confidence: 99%
“…Therefore, the students only need a web browser to participate in the evaluation process. To simulate the anonymous communication channel in phases B and C we utilize the Broadcast Anonymous Routing (BAR) protocol [24] using a single Broadcast Anonymous Server [29] offering n-anonymity for the sender, since this is sufficient for our environment. Obviously students who are attending/evaluating a course disclose their identity to the lecturer/questionnaire server and their goal is to achieve sender n-anonymity when broadcasting their evaluations.…”
Section: System Evaluationmentioning
confidence: 99%
“…The model defines an N-number group, and only one member is allowed to send messages in a given round. Messages are sent via broadcasting without the need for a trust center [17]. However, since the encryption process requires the cooperation of all members, it is vulnerable to internal dishonest members, and it is easy to break the security of the model [18].…”
Section: Introductionmentioning
confidence: 99%
“…Compared to the systems based on single-agent, this type of systems could obtain more anonymity. Anonymous systems based on multicast/broadcast include DC-Net [6], SAM [7], P5 [5], Herbivore [8], K-Anonymity [9], M2 [10], MAM [11], Dissent [12], [13], and BAR [14].…”
Section: Introductionmentioning
confidence: 99%