Express: Lowering the cost of metadata-hiding communication with cryptographic privacy

S Eskandarian, H Corrigan-Gibbs, M Zaharia… - 30th USENIX Security …, 2021 - usenix.org
Existing systems for metadata-hiding messaging that provide cryptographic privacy
properties have either high communication costs, high computation costs, or both. In this …

Breaking and (partially) fixing provably secure onion routing

C Kuhn, M Beck, T Strufe - 2020 IEEE Symposium on Security …, 2020 - ieeexplore.ieee.org
After several years of research on onion routing, Camenisch and Lysyanskaya, in an attempt
at rigorous analysis, defined an ideal functionality in the universal composability model …

SoK: Metadata-protecting communication systems

S Sasy, I Goldberg - Proceedings on Privacy Enhancing …, 2024 - petsymposium.org
Protecting metadata of communications has been an area of active research since the
dining cryptographers problem was introduced by David Chaum in 1988. The Snowden …

Covid notions: Towards formal definitions–and documented understanding–of privacy goals and claimed protection in proximity-tracing services

C Kuhn, M Beck, T Strufe - Online Social Networks and Media, 2021 - Elsevier
The recent SARS-CoV-2 pandemic gave rise to management approaches using mobile
apps for contact tracing. The corresponding apps track individuals and their interactions, to …

Towards a collection of security and privacy patterns

M Papoutsakis, K Fysarakis, G Spanoudakis… - Applied Sciences, 2021 - mdpi.com
Featured Application Internet of Things and Industrial Internet of Things. Abstract Security
and privacy (SP)-related challenges constitute a significant barrier to the wider adoption of …

[PDF][PDF] Blending different latency traffic with beta mixing

I BEN GUIRAT, D Das, C Diaz - Proceedings on Privacy …, 2023 - lirias.kuleuven.be
We analyze the anonymity provided by continuous mixnets (eg, Loopix) when messages
with different latency requirements are sent through the same network. The anonymity …

Enhancing the Unlinkability of Circuit-Based Anonymous Communications with k-Funnels

V Nunes, J Brás, A Carvalho, D Barradas… - Proceedings of the …, 2023 - dl.acm.org
Anonymous communication systems are essential tools for preserving privacy and freedom
of expression. However, traffic analysis attacks make it challenging to maintain unlinkability …

2PPS—publish/subscribe with provable privacy

SA Gaballah, C Coijanovic, T Strufe… - … on reliable distributed …, 2021 - ieeexplore.ieee.org
Publish/Subscribe systems like Twitter and Reddit let users communicate with many
recipients without requiring prior personal connections. The content that participants of these …

Tor network anonymity evaluation based on node anonymity

J Cui, C Huang, H Meng, R Wei - Cybersecurity, 2023 - Springer
In order to address the shortcomings of traditional anonymity network anonymity evaluation
methods, which only analyze from the perspective of the overall network and ignore the …

Strong anonymity for mesh messaging

N Perry, B Spang, S Eskandarian, D Boneh - arXiv preprint arXiv …, 2022 - arxiv.org
Messaging systems built on mesh networks consisting of smartphones communicating over
Bluetooth have been used by protesters around the world after governments have disrupted …