TY - GEN
T1 - Jack
T2 - 9th Annual ACM Workshop on Privacy in the Electronic Society, WPES '10, Co-located with CCS'10
AU - Lin, Zi
AU - Hopper, Nicholas
PY - 2010
Y1 - 2010
N2 - Anonymous blacklisting schemes enable online service providers to block future accesses from abusive users behind anonymizing networks, such as Tor, while preserving the privacy of all users, both abusive and non-abusive. Several such schemes exist in the literature, but all suffer from one of several faults: they rely on trusted parties that can collude to de-anonymize users, they scale poorly with the number of blacklisted users, or they place a very high computational load on the trusted parties. We introduce Jack, an efficient, scalable anonymous blacklisting scheme based on cryptographic accumulators. Compared to the previous efficient schemes, Jack significantly reduces the communication and computation costs required of trusted parties while also weakening the trust placed in these parties. Compared with schemes with no trusted parties, Jack enjoys constant scaling with respect to the number of blacklisted users, imposing dramatically reduced computation and communication costs for service providers. Jack is provably secure in the random oracle model, and we demonstrate its efficiency both analytically and experimentally.
AB - Anonymous blacklisting schemes enable online service providers to block future accesses from abusive users behind anonymizing networks, such as Tor, while preserving the privacy of all users, both abusive and non-abusive. Several such schemes exist in the literature, but all suffer from one of several faults: they rely on trusted parties that can collude to de-anonymize users, they scale poorly with the number of blacklisted users, or they place a very high computational load on the trusted parties. We introduce Jack, an efficient, scalable anonymous blacklisting scheme based on cryptographic accumulators. Compared to the previous efficient schemes, Jack significantly reduces the communication and computation costs required of trusted parties while also weakening the trust placed in these parties. Compared with schemes with no trusted parties, Jack enjoys constant scaling with respect to the number of blacklisted users, imposing dramatically reduced computation and communication costs for service providers. Jack is provably secure in the random oracle model, and we demonstrate its efficiency both analytically and experimentally.
KW - anonymous authentication
KW - anonymous blacklisting
KW - privacy-enhancing revocation
UR - http://www.scopus.com/inward/record.url?scp=78650209785&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=78650209785&partnerID=8YFLogxK
U2 - 10.1145/1866919.1866927
DO - 10.1145/1866919.1866927
M3 - Conference contribution
AN - SCOPUS:78650209785
SN - 9781450300964
T3 - Proceedings of the ACM Conference on Computer and Communications Security
SP - 53
EP - 62
BT - Proceedings of the 9th Annual ACM Workshop on Privacy in the Electronic Society, WPES '10, Co-located with CCS'10
Y2 - 4 October 2010 through 8 October 2010
ER -