BNymble: More anonymous blacklisting at almost no cost (a short paper)

Peter Lofgren, Nick Hopper

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

Abstract

Anonymous blacklisting schemes allow online service providers to prevent future anonymous access by abusive users while preserving the privacy of all anonymous users (both abusive and non-abusive). The first scheme proposed for this purpose was Nymble, an extremely efficient scheme based only on symmetric primitives; however, Nymble relies on trusted third parties who can collude to de-anonymize users of the scheme. Two recently proposed schemes, Nymbler and Jack, reduce the trust placed in these third parties at the expense of using less-efficient asymmetric crypto primitives. We present BNymble, a scheme which matches the anonymity guarantees of Nymbler and Jack while (nearly) maintaining the efficiency of the original Nymble. The key insight of BNymble is that we can achieve the anonymity goals of these more recent schemes by replacing only the infrequent "User Registration" protocol from Nymble with asymmetric primitives. We prove the security of BNymble, and report on its efficiency.

Original languageEnglish (US)
Title of host publicationFinancial Cryptography and Data Security - 15th International Conference, FC 2011, Revised Selected Papers
Pages268-275
Number of pages8
DOIs
StatePublished - Feb 21 2012
Event15th International Conference on Financial Cryptography and Data Security, FC 2011 - Gros Islet, Saint Lucia
Duration: Feb 28 2011Mar 4 2011

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7035 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other15th International Conference on Financial Cryptography and Data Security, FC 2011
CountrySaint Lucia
CityGros Islet
Period2/28/113/4/11

Fingerprint Dive into the research topics of 'BNymble: More anonymous blacklisting at almost no cost (a short paper)'. Together they form a unique fingerprint.

Cite this