Lookup Protocols and Techniques for Anonymity

dc.contributor.advisorKatz, Jonathanen_US
dc.contributor.advisorBhattacharjee, Bobbyen_US
dc.contributor.authorMorselli, Ruggeroen_US
dc.contributor.departmentComputer Scienceen_US
dc.contributor.publisherDigital Repository at the University of Marylanden_US
dc.contributor.publisherUniversity of Maryland (College Park, Md.)en_US
dc.date.accessioned2007-02-01T20:20:13Z
dc.date.available2007-02-01T20:20:13Z
dc.date.issued2006-08-18en_US
dc.description.abstractThis dissertation covers two topics of interest for network applications: lookup protocols, a basic building block for distributed systems, and ring signatures, a powerful primitive for anonymous communication. In the first part of this work, we review lookup protocols, distributed algorithms that allow users to publish a document as well as to look up a published document that matches a given name. Our first major contribution is to design Local Minima Search (LMS), a new efficient lookup protocol for a model in which a node is physically connected to a few other nodes and may only communicate directly with them. Our second major contribution is the formulation of a new model in which we allow an arbitrary number of misbehaving nodes, but we assume a restriction on their network addresses. We then design a new lookup protocol for this setting. In the second part of this dissertation, we present our work on ring signatures, a variant of digital signatures, which enables a user to sign a message so that a set of possible signers is identified, without revealing which member of that set actually generated the signature. Our first contribution on this topic is new definitions of security which address attacks not taken into account by previous work. As our second contribution, we design the first provably secure ring signature schemes in the standard model.en_US
dc.format.extent1265189 bytes
dc.format.mimetypeapplication/pdf
dc.identifier.urihttp://hdl.handle.net/1903/4053
dc.language.isoen_US
dc.subject.pqcontrolledComputer Scienceen_US
dc.subject.pquncontrolledlookup protocolsen_US
dc.subject.pquncontrolledring signaturesen_US
dc.subject.pquncontrolledcryptographyen_US
dc.subject.pquncontrolledpeer-to-peeren_US
dc.subject.pquncontrolledanonymityen_US
dc.subject.pquncontrolledsecurityen_US
dc.titleLookup Protocols and Techniques for Anonymityen_US
dc.typeDissertationen_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
umi-umd-3788.pdf
Size:
1.21 MB
Format:
Adobe Portable Document Format