Riposte: An Anonymous Messaging System Handling Millions of Users

@article{CorriganGibbs2015RiposteAA,
  title={Riposte: An Anonymous Messaging System Handling Millions of Users},
  author={Henry Corrigan-Gibbs and Dan Boneh and David Mazi{\`e}res},
  journal={2015 IEEE Symposium on Security and Privacy},
  year={2015},
  pages={321-338}
}
  • Henry Corrigan-Gibbs, Dan Boneh, David Mazières
  • Published in
    IEEE Symposium on Security…
    2015
  • Computer Science
  • This paper presents Riposte, a new system for anonymous broadcast messaging. Riposte is the first such system, to our knowledge, that simultaneously protects against traffic-analysis attacks, prevents anonymous denial-of-service by malicious clients, and scales to million-user anonymity sets. To achieve these properties, Riposte makes novel use of techniques used in systems for private information retrieval and secure multi-party computation. For latency-tolerant workloads with many more… CONTINUE READING

    Citations

    Publications citing this paper.
    SHOWING 1-10 OF 107 CITATIONS

    Talek: Private Group Messaging with Hidden Access Patterns

    VIEW 4 EXCERPTS
    CITES BACKGROUND
    HIGHLY INFLUENCED

    Advances in Cryptology – ASIACRYPT 2018

    VIEW 5 EXCERPTS
    CITES METHODS & BACKGROUND
    HIGHLY INFLUENCED

    AnoniMME: Bringing Anonymity to the Matchmaker Exchange Platform for Rare Disease Gene Discovery

    VIEW 10 EXCERPTS
    CITES BACKGROUND, METHODS & RESULTS
    HIGHLY INFLUENCED

    Practical Improvements to User Privacy in Cloud Applications

    VIEW 7 EXCERPTS
    CITES BACKGROUND & METHODS
    HIGHLY INFLUENCED

    Scalable and Provably Secure P2P Communication Protocols

    VIEW 6 EXCERPTS
    CITES BACKGROUND
    HIGHLY INFLUENCED

    Riffle: An Efficient Communication System With Strong Anonymity

    VIEW 10 EXCERPTS
    CITES METHODS, BACKGROUND & RESULTS
    HIGHLY INFLUENCED

    Splinter: Practical Private Queries on Public Data

    VIEW 9 EXCERPTS
    CITES METHODS & BACKGROUND
    HIGHLY INFLUENCED

    Judge, Jury & Encryptioner: Exceptional Access with a Fixed Social Cost

    VIEW 3 EXCERPTS
    CITES BACKGROUND & METHODS
    HIGHLY INFLUENCED

    FILTER CITATIONS BY YEAR

    2015
    2020

    CITATION STATISTICS

    • 10 Highly Influenced Citations

    • Averaged 24 Citations per year from 2017 through 2019

    • 47% Increase in citations per year in 2019 over 2018

    References

    Publications referenced by this paper.
    SHOWING 1-10 OF 78 REFERENCES

    Distributed Point Functions and Their Applications

    VIEW 7 EXCERPTS
    HIGHLY INFLUENTIAL

    Efficient Zero-Knowledge Argument for Correctness of a Shuffle

    VIEW 4 EXCERPTS
    HIGHLY INFLUENTIAL

    The dining cryptographers problem: Unconditional sender and recipient untraceability

    • David Chaum
    • Mathematics, Computer Science
    • Journal of Cryptology
    • 2004
    VIEW 7 EXCERPTS
    HIGHLY INFLUENTIAL

    Tor: The Second-Generation Onion Router

    VIEW 5 EXCERPTS
    HIGHLY INFLUENTIAL

    Private Information Storage

    VIEW 3 EXCERPTS
    HIGHLY INFLUENTIAL

    Private information retrieval

    VIEW 4 EXCERPTS
    HIGHLY INFLUENTIAL

    Court gave NSA broad leeway in surveillance, documents show

    • E. Nakashima, B. Gellman
    • Washington Post, 30 Jun. 2014.
    • 2014
    VIEW 1 EXCERPT