Back to Results
First PageMeta Content
Information / Internet privacy / Crowds / IP / Public-key cryptography / Communications protocol / Onion routing / Anonymity / Alice and Bob / Cryptography / Cryptographic protocols / Data


Security Analysis of Accountable Anonymity in Dissent EWA SYTA, HENRY CORRIGAN-GIBBS, SHU-CHUN WENG, DAVID WOLINSKY, and BRYAN FORD, Yale University AARON JOHNSON, U.S. Naval Research Laboratory Users often wish to comm
Add to Reading List

Document Date: 2014-08-17 14:47:48


Open Document

File Size: 943,15 KB

Share Result on Facebook

Company

Bayer / Furukawa / Computer-Communication Networks / Dining Cryptographers Networks / /

Currency

USD / /

/

Event

FDA Phase / Product Issues / /

IndustryTerm

anonymity protocols / generation algorithm / secure anonymous communication protocol / cryptographic tools / wrapper protocol / deterministic decryption algorithm / communication protocol / specified key generation algorithm / possible applications / anonymous data collection protocol / basic protocol / latency-sensitive applications / protocol algorithm / possible solution / secure protocol / deterministic verification algorithm / mix-networks / k-anonymous transmission protocols / related anonymous communication systems / encryption algorithm / shuffle protocol / consensus protocol / /

Organization

Defense Advanced Research Projects Agency / L. Each / L. All / VERIFY-PROOF-B. All / U.S. Securities and Exchange Commission / Yale University / E. Syta et al. / /

Person

BRYAN FORD / Henry Corrigan-Gibbs / Ewa Syta / Aaron Johnson / DAVID WOLINSKY / Diaz / SHU-CHUN WENG / /

Position

Network Protocols General / General / Corresponding author / author / Owner/Author / /

Product

CCA2 / Brickell / member / /

PublishedMedium

Yale Law Journal / /

Technology

anonymous data collection protocol / three algorithms / ANONYMIZE-S. This algorithm / ANONYMIZE algorithms / encryption algorithm / provably secure anonymous communication protocol / provably secure protocol / SETUP algorithm / ANONYMIZE algorithm / private key / two protocols / instant messaging / inner encryption / ANONYMIZE-S algorithm / GMP-BULK protocol / anonymity protocols / consensus protocol / encryption / shuffle protocol / bulk protocol / k-anonymous transmission protocols / deterministic verification algorithm / SETUP-S algorithm / GMP-Bulk Protocol The GMP-BULK protocol / specified key generation algorithm / key generation algorithm / public key / specific anonymity protocols / deterministic decryption algorithm / signing algorithm / protocol algorithm / basic protocol / improved protocol / serialized GMP-SHUFFLE protocol / communication protocol / file sharing / GMP-Shuffle Protocol The GMP-SHUFFLE protocol / GMP-SHUFFLE protocol / VERIFY-PROOF algorithm / wrapper protocol / digital signature / following algorithms / DISSENT protocol / Network Protocols / on hardening the DISSENT protocol / /

URL

http /

SocialTag