Share This Author
Building a high-performance, programmable secure coprocessor
Reputation and Reliability in Collective Goods
An important organizational innovation enabled by the revolution in information technologies is `open source' production which converts private commodities into essentially public goods. Similar to…
Blacklistable anonymous credentials: blocking misbehaving users without ttps
- Patrick P. Tsang, M. Au, Apu Kapadia, Sean W. Smith
- Computer ScienceConference on Computer and Communications…
- 28 October 2007
This work presents the first anonymous credential system in which services can "blacklist" misbehaving users without contacting a trusted third party (TTP), and misbehaviors can be judged subjectively without users fearing arbitrary deanonymization by a TTP.
Protecting client privacy with trusted computing at the server
It's possible to exploit robust server-side secure hardware to enhance user privacy using secure coprocessors at the server, two case studies demonstrate.
Nymble: Blocking Misbehaving Users in Anonymizing Networks
- Patrick P. Tsang, Apu Kapadia, Cory Cornelius, Sean W. Smith
- Computer ScienceIEEE Transactions on Dependable and Secure…
- 1 March 2011
Nymble is presented, a system in which servers can “blacklist” misbehaving users, thereby blocking users without compromising their anonymity, and the privacy of blacklisted users is maintained.
Nymble: Anonymous IP-Address Blocking
- Peter C. Johnson, Apu Kapadia, Patrick P. Tsang, Sean W. Smith
- Computer SciencePrivacy Enhancing Technologies
- 20 June 2007
A system in which honest users remain anonymous and their requests unlinkable; a server can complain about a particular anonymous user and gain the ability to blacklist the user for future connections; this blacklisted user's accesses before the complaint remain anonymous; and the system is agnostic to different servers' definitions of misbehavior.
Practical server privacy with secure coprocessors
This paper considers the problem in the light of commercially available secure coprocessors--whose internal memory is still much, much smaller than the typical database size--and constructs an algorithm that both provides asymptotically optimal performance and also promises reasonable performance in real implementations.
PEREA: towards practical TTP-free revocation in anonymous authentication
PEREA is a new anonymous authentication scheme for which the time complexity of authentication is linear in the size of a revocation window, the number of subsequent authentications before which a user's misbehavior must be recognized if the user is to be revoked.
Private Information Storage with Logarithm-Space Secure Hardware
In Private Information Retrieval (PIR), a user obtains one of N records from a server, without the server learning what record was requested.
The Quality of Open Source Production: Zealots and Good Samaritans in the Case of Wikipedia
New forms of production based in electronic technology, such as open-source and opencontent production, convert private commodities (typically software) into essentially public goods. A number of…