搜索结果: 1-15 共查到“军队指挥学 Anonymity”相关记录34条 . 查询时间(0.236 秒)
Statistical Analysis and Anonymity of TOR's Path Selection
onion routing cryptography cyber security
2019/6/3
Tor is a network based on the onion routing infrastructure and provides many advantages, including tracking avoidance, research, wider access and, unfortunately, illegal activities. To achieve this, t...
Lelantus: Towards Confidentiality and Anonymity of Blockchain Transactions from Standard Assumptions
Zero-knowledge Proofs Confidential Transactions Zcoin
2019/4/15
We propose Lelantus, a new anonymous payment system which ensures both transaction confidentiality and anonymity with small proof sizes, short verification times and without requiring a trusted setup.
A New Blind ECDSA Scheme for Bitcoin Transaction Anonymity
Blind signature ECDSA Paillier cryptosystem
2018/7/9
In this paper, we consider a scenario where a bitcoin liquidity provider sells bitcoins to clients. When a client pays for a bitcoin online, the provider is able to link the client's payment informati...
Off-line Digital Cash Schemes Providing Unlinkability, Anonymity and Change
Digital money group blind signature double spending
2017/12/25
Several ecash systems have been proposed in the last twenty years or so,each offering features similar to real cash. One feature which to date has not been provided is that of a payee giving change to...
Anonymity Trilemma: Strong Anonymity, Low Bandwidth, Low Latency---Choose Two
Strong Anonymity Low Bandwidth
2017/9/29
This work investigates the fundamental constraints of anonymous communication (AC) protocols. We analyze the relationship between bandwidth overhead, latency overhead, and sender anonymity or recipien...
Lattice-Based Techniques for Accountable Anonymity: Composition of Abstract Stern’s Protocols and Weak PRF with Efficient Protocols from LWR
Lattice-Based Cryptography Zero-Knowledge Arguments of Knowledge Privacy-Preserving Protocol
2017/8/17
In an accountable anonymous system, a user is guaranteed anonymity and unlinkability unless some well-defined condition is met. A line of research focus on schemes that do not rely on any trusted thir...
Accumulators with Applications to Anonymity-Preserving Revocation
accumulators anonymous credentials revocation
2017/2/20
Membership revocation is essential for cryptographic applications, from traditional PKIs to group signatures and anonymous credentials. Of the various solutions for the revocation problem that have be...
Two Cents for Strong Anonymity: The Anonymous Post-office Protocol
Anonymity Mixnets Privacy Annonymous communication
2016/5/23
We introduce the {\em Anonymous Post-office Protocol (AnonPoP)}, a practical strongly-anonymous messaging system. AnonPoP offers anonymity against globally eavesdropping adversaries that control a maj...
A Decentralized Anonymity-Preserving Reputation System with Constant-time Score Retrieval
reputation sytem trustless anonymity
2016/5/3
Reputation systems are a major feature of every
modern e-commerce website, helping buyers carefully choose
their service providers and products. However, most websites use
centralized reputation sy...
Semantically Secure Anonymity: Foundations of Re-encryption
probabilistic re-encryption key anonymity anonymous communication
2016/4/6
The notion of universal re-encryption is an established primitive used in the design of many anonymity protocols. It allows anyone to randomize a ciphertext without changing its size, without decrypti...
Crypto-analyses on “user efficient recoverable off-line e-cashs scheme with fast anonymity revoking”
anonymity unlikability cryptanalysis
2016/1/26
Recently, Fan et al. proposed a user efficient recoverable off-line e-cash scheme
with fast anonymity revoking. They claimed that their scheme could achieve security
requirements of an e-cash system...
We propose Mixcoin, a protocol to facilitate anonymous payments
in Bitcoin and similar cryptocurrencies. We build on the emergent
phenomenon of currency mixes, adding an accountability mechanism to
...
(Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection
Tor Tor path selection Provable privacy
2016/1/8
In this paper we present MATOR: a framework for rigorously assessing the degree of anonymity in the
Tor network. The framework explicitly addresses how user anonymity is impacted by real-life charact...
Road-to-Vehicle Communications with Time-Dependent Anonymity: A Light Weight Construction and its Experimental Results
Experimental Results cryptographic protocols
2016/1/6
This paper describes techniques that enable vehicles to collect local information (such as road conditions
and traffic information) and report it via road-to-vehicle communications. To exclude malici...
Post-Quantum Forward-Secure Onion Routing (Future Anonymity in Today’s Budget)
Tor Onion routing Forward anonymity
2016/1/5
The onion routing (OR) network Tor provides anonymity to its users by routing their encrypted
traffic through three proxies (or nodes). The key cryptographic challenge, here, is to establish symmetri...