Article
Chemistry, Analytical
Xiance Meng, Mangui Liang
Summary: This paper proposes a port-based anonymous communication network (PBACN) that reduces latency and improves anonymity compared to Tor. By using a path construction algorithm and a port-based source routing addressing method, the proposed PBACN achieves a higher level of anonymity while simplifying routing complexity.
Article
Computer Science, Hardware & Architecture
Pankaj Kumar, Hari Om
Summary: This paper proposes an anonymous and authenticated V2I communication protocol with a simplified strategy for user revocation and re-registration. The protocol ensures security using hash-based security and Elliptic Curve Discrete Logarithmic Problem (ECDLP). The paper provides formal and informal security analysis, as well as employs AVISPA tool-based automated simulation to ensure security. The performance analysis shows that the proposed protocol has higher security and privacy factors compared to similar protocols.
JOURNAL OF SUPERCOMPUTING
(2023)
Article
Computer Science, Theory & Methods
Kang Yang, Liqun Chen, Zhenfeng Zhang, Christopher J. P. Newton, Bo Yang, Li Xi
Summary: Direct Anonymous Attestation (DAA) is an anonymous signature scheme that aims to protect user privacy and reduce the TPM signing workload. The proposed scheme in this paper achieves optimal TPM signing efficiency by generating signatures with just one exponentiation, which can be pre-computed. Experimental results show that this scheme is 2x to 5x faster in signing efficiency compared to existing DAA schemes.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
(2021)
Article
Engineering, Multidisciplinary
Kehe Wu, Jiyu Zhang, Xiaochen Jiang, Rui Cheng, Xiaoliang Zhang, Jie Tong
Summary: This study designs a certificateless anonymous key agreement protocol for the Power IoT, which solves the problem of terminal access. The protocol ensures anonymity and prevents malicious connections by encrypting authentication information and setting up SDP controllers. Experimental results demonstrate the advantages of this scheme in terms of communication and computation costs.
ALEXANDRIA ENGINEERING JOURNAL
(2023)
Article
Computer Science, Information Systems
Zhaolong Wang, Yanwei Zhou, Zirui Qiao, Bo Yang, Chunxiang Gu, Yuan Xu, Mingwu Zhang
Summary: This article proposes a certificateless-based anonymous and revocable authentication protocol for vehicle-to-vehicle communications. The protocol separates the identity authentication process from the traffic message verification, reducing the overhead and improving the authentication speed and communication efficiency.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Computer Science, Hardware & Architecture
Krittibas Parai, S. K. Hafizul Islam
Summary: We have developed an IoT-based real-time remote healthcare monitoring framework that ensures the security and privacy of patient data using elliptic curve cryptography and collision-resistant one-way hash function. The framework has low execution costs compared to existing schemes and has been proven to be secure in the random oracle model. Simulation results confirm its ability to withstand known passive and active attacks. Real-time implementation in an IoT healthcare environment further demonstrates its feasibility.
JOURNAL OF SYSTEMS ARCHITECTURE
(2023)
Article
Computer Science, Hardware & Architecture
Zhen Yan, Haipeng Qu, Xiaoshuai Zhang, Jian-Liang Xu, Xi-Jun Lin
Summary: Cloud-based anonymous messaging systems are widely used for covert conversations, but there are practical issues in identity-based matchmaking encryption (IB-ME), such as achieving indistinguishability under adaptive chosen identity and ciphertext attacks (IND-ID-CCA) and reducing the computational cost of the receiver. This paper proposes a solution called identity-based proxy matchmaking encryption (IB-PME) to address these issues.
JOURNAL OF SYSTEMS ARCHITECTURE
(2023)
Article
Computer Science, Theory & Methods
Andrea Agiollo, Enkeleda Bardhi, Mauro Conti, Nicolo Dal Fabbro, Riccardo Lazzeretti
Summary: This paper proposes an anonymous-by-design FL framework based on NDN, which addresses the security and privacy issues in FL. With a custom communication protocol, the framework achieves anonymity and privacy requirements while improving communication efficiency.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2024)
Article
Business, Finance
Travis Dyer, Eunjee Kim
Summary: During the short window around research releases, investors show muted stock price reactions to anonymous equity research compared to nonanonymous research. The discount to anonymous research dissipates as content contributors are monitored more closely and authors develop a reputation for high-quality reporting, indicating that investors are concerned about the credibility of anonymous equity research.
JOURNAL OF ACCOUNTING RESEARCH
(2021)
Article
Chemistry, Analytical
Saw Nang Paing, Jason William Setiawan, Shehbaz Tariq, Muhammad Talha Rahim, Kyesan Lee, Hyundong Shin
Summary: This paper proposes a new anonymous quantum teleportation protocol based on counterfactual communication. It achieves anonymity between the sender and the receiver by distributing counterfactual entanglement among participants in the network. The protocol is proven to be secure, correct, and private, and its robustness under channel noise is analyzed and compared to conventional protocols. The proposed protocol provides higher security and practicality in teleportation under noisy environments.
Article
Telecommunications
Prasanta Kumar Roy, Ansuman Bhattacharya
Summary: This paper proposes a certificate-less anonymous two-factor authentication protocol based on Elliptic Curve Cryptography (ECC). The protocol’s robustness under various security attacks is ensured through formal verification using BAN logic and automated security validation with AVISPA tool.
WIRELESS PERSONAL COMMUNICATIONS
(2022)
Article
Quantum Science & Technology
Awais Khan, Uman Khalid, Junaid Ur Rehman, Kyesan Lee, Hyundong Shin
Summary: The article introduces a quantum anonymous collision detection protocol that ensures anonymity and security against adversaries and malicious participants.
EPJ QUANTUM TECHNOLOGY
(2021)
Article
Computer Science, Information Systems
Ricard Borges, Francesc Sebe, Magda Valls
Summary: In this paper, a privacy-preserving ETC system is proposed to protect the privacy of drivers while allowing them to pay toll fees. The system ensures anonymity and unlinkability of all interactions between the vehicles and the system. The security of the proposal has been analyzed and its feasibility has been demonstrated through prototype implementation.
INTERNATIONAL JOURNAL OF INFORMATION SECURITY
(2022)
Article
Information Science & Library Science
Jacob A. Young, James F. Courtney, Rebecca J. Bennett, Timothy Selwyn Ellis, Clay Posey
Summary: The study found that while anonymous whistleblowers were perceived as less credible than identified whistleblowers in one-way communication, there was no statistical difference in credibility when using two-way communication. The results suggest the use of anonymous, two-way communication in whistleblowing reporting systems to protect the anonymity and safety of whistleblowers.
INFORMATION TECHNOLOGY & PEOPLE
(2021)
Article
Engineering, Electrical & Electronic
Muhammad Umar, S. K. Hafizul Islam, Khalid Mahmood, Shafiq Ahmed, Zahid Ghaffar, Muhammad Asad Saleem
Summary: The article introduces a lightweight privacy-preserving authentication protocol for VANETs, which is compared to existing protocols, lighter, safer, and more practical, making it more reliable and convenient for secure data transmission in VANETs.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2021)
Article
Computer Science, Hardware & Architecture
Joan Feigenbaum, Bryan Ford
COMMUNICATIONS OF THE ACM
(2015)
Article
Computer Science, Theory & Methods
Mark Silberstein, Bryan Ford, Idit Keidar, Emmett Witchel
ACM TRANSACTIONS ON COMPUTER SYSTEMS
(2014)
Article
Computer Science, Hardware & Architecture
Mark Silberstein, Bryan Ford, Emmett Witchel
COMMUNICATIONS OF THE ACM
(2014)
Article
Computer Science, Information Systems
Eleftherios Kokoris-Kogias, Enis Ceyhun Alp, Linus Gasser, Philipp Jovanovic, Ewa Syta, Bryan Ford
PROCEEDINGS OF THE VLDB ENDOWMENT
(2020)
Proceedings Paper
Computer Science, Theory & Methods
Enis Ceyhun Alp, Eleftherios Kokoris-Kogias, Georgia Fragkouli, Bryan Ford
PROCEEDINGS OF THE WORKSHOP ON HOT TOPICS IN OPERATING SYSTEMS (HOTOS '19)
(2019)
Proceedings Paper
Computer Science, Theory & Methods
Eleftherios Kokoris-Kogias, Philipp Jovanovic, Linus Gasser, Nicolas Gailly, Ewa Syta, Bryan Ford
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP)
(2018)
Proceedings Paper
Computer Science, Theory & Methods
Stevens Le Blond, Alejandro Cuevas, Juan Ramon Troncoso-Pastoriza, Philipp Jovanovic, Bryan Ford, Jean-Pierre Hubaux
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP)
(2018)
Proceedings Paper
Computer Science, Software Engineering
Kirill Nikitin, Eleftherios Kokoris-Kogias, Philipp Jovanovic, Linus Gasser, Nicolas Gailly, Ismail Khoffi, Justin Cappos, Bryan Ford
PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17)
(2017)
Proceedings Paper
Engineering, Electrical & Electronic
Maria Borge, Eleftherios Kokoris-Kogias, Philipp Jovanovic, Linus Gasser, Nicolas Gailly, Bryan Ford
2017 2ND IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW)
(2017)
Proceedings Paper
Computer Science, Software Engineering
Albert Kwon, Henry Corrigan-Gibbs, Srinivas Devadas, Bryan Ford
PROCEEDINGS OF THE TWENTY-SIXTH ACM SYMPOSIUM ON OPERATING SYSTEMS PRINCIPLES (SOSP '17)
(2017)
Proceedings Paper
Computer Science, Information Systems
Joan Feigenbaum, Bryan Ford
SECURITY PROTOCOLS XXV
(2017)
Proceedings Paper
Computer Science, Information Systems
Ennan Zhai, David Isaac Wolinsky, Ruichuan Chen, Ewa Syta, Chao Teng, Bryan Ford
13TH USENIX SYMPOSIUM ON NETWORKED SYSTEMS DESIGN AND IMPLEMENTATION (NSDI '16)
(2016)