Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society 2005
DOI: 10.1145/1102199.1102201
|View full text |Cite
|
Sign up to set email alerts
|

The pynchon gate

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0

Year Published

2008
2008
2024
2024

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 35 publications
(3 citation statements)
references
References 13 publications
0
1
0
Order By: Relevance
“…Pynchon Gate [61] (2005) is one of the earliest works that used PIR to design private communications; their work proposes a practical pseudonymous mail retrieval system. Their system consists of three types of nodes: a nym server, a collator, and distributors.…”
Section: Private-read Based Systemsmentioning
confidence: 99%
“…Pynchon Gate [61] (2005) is one of the earliest works that used PIR to design private communications; their work proposes a practical pseudonymous mail retrieval system. Their system consists of three types of nodes: a nym server, a collator, and distributors.…”
Section: Private-read Based Systemsmentioning
confidence: 99%
“…Using these statistical mechanisms, the system could report confidence levels about the quality of reports arriving from sensors. The system could then provide anonymous feedback [59] to the sensor nodes that have returned low-confidence reports, following which honest nodes can recalibrate their sensors. The system could also temporarily "revoke" the node's ability to report data using an anonymous blocking or revocation system [60]- [62].…”
Section: B Integrity Issuesmentioning
confidence: 99%
“…The Pynchon Gate [70] constitutes a rather different approach to recipient pseudonymity. Instead of delivering messages to recipients over a remailer network that supports reply messages, the Pynchon Gate makes use of private information retrieval techniques.…”
Section: Private Information Retrievalmentioning
confidence: 99%