This is a list of papers we will discuss in class. Feel free to
suggest any others you may find appropriate. A good starting point
for finding papers in this area is Free Haven's Selected Papers in
Anonymity site.
Privacy |
'I've Got Nothing to Hide' and Other Misunderstandings of Privacy (local cached copy) Daniel J. Solove, San Diego Law Review, Vol. 44, 2007 |
A Classification for Privacy Techniques (local cached copy) Carlisle Adams, University of Ottawa Law & Technology Journal 3, 2006 |
PETs for the Internet |
Privacy-enhancing Technologies for the Internet (local cached copy) Ian Goldberg, David Wagner, Eric Brewer, IEEE COMPCON 1997 |
Privacy-enhancing technologies for the Internet, II: Five years later (local cached copy) Ian Goldberg, PET 2002 |
Privacy-enhancing technologies for the Internet III: Ten years later (local cached copy) Ian Goldberg, "Digital Privacy: Theory, Technologies and Practices", Alessandro Acquisti, Stefanos Gritzalis, Costas Lambrinoudakis, and Sabrina De Capitani di Vimercati, editors, 2007 |
Anonymity and Pseudonymity |
Untraceable electronic mail, return addresses, and digital pseudonyms (local cached copy) D. Chaum, Communications of the ACM, 1981 |
Crowds: Anonymity for Web Transactions (local cached copy) M. Reiter, A. Rubin, ACM TISSEC, 1998 |
Mixminion: Design of a Type III Anonymous Remailer Protocol (local cached copy) G. Danezis, R. Dingledine, N. Mathewson, IEEE SSP (Oakland) 2003 |
On the Economics of Anonymity (local cached copy) Alessandro Acquisti, Roger Dingledine, Paul Syverson, FC 2003 |
Towards an Analysis of Onion Routing Security (local cached copy) P. Syverson, G. Tsudik, M. Reed, C. Landwehr, PET 2000 |
Tor: The Second-Generation Onion Router (local cached copy) R.Dingledine, N.Mathewson, P.Syverson, USENIX Security, 2004 |
Privacy in P2P networks |
The Sybil Attack (local cached copy) J. Douceur, IPTPS 2002 |
Tarzan: A Peer-to-Peer Anonymizing Network Layer (local cached copy) M.J. Freedman, R. Morris, CCS 2002 |
Introducing MorphMix: Peer-to-Peer based Anonymous Internet Usage with Collusion Detection (local cached copy) Marc Rennhard, Bernhard Plattner, WPES 2002 |
Breaking the Collusion Detection Mechanism of MorphMix (local cached copy) Parisa Tabriz, Nikita Borisov, PET 2006 |
Censorship Resistance |
The Eternity Service (local cached copy) R. Anderson, Pragocrypt 1996 |
Publius: A robust, tamper-evident, censorship-resistant and source-anonymous web publishing system (local cached copy) Marc Waldman, Aviel Rubin, Lorrie Cranor, Usenix Security 2000 |
The Free Haven Project: Distributed Anonymous Storage Service (local cached copy) Roger Dingledine, Michael J. Freedman, David Molnar, PET 2000 |
Freenet: A Distributed Anonymous Information Storage and Retrieval System (local cached copy) Ian Clarke, Oskar Sandberg, Brandon Wiley, Theodore W. Hong, PET 2000 |
Traffic Analysis |
Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems (local cached copy) Jean-François Raymond, PET 2000 |
Towards measuring anonymity (local cached copy) Claudia Díaz, Stefaan Seys, Joris Claessens, Bart Preneel, PET 2002 |
Towards an Information Theoretic Metric for Anonymity (local cached copy) Andrei Serjantov, George Danezis, PET 2002 |
An Analysis of the Degradation of Anonymous Protocols (local cached copy) M. Wright, M. Adler, B.N. Levine, C. Shields, NDSS 2002 |
Practical Traffic Analysis: Extending and Resisting Statistical Disclosure (local cached copy) N. Mathewson, R. Dingledine, PET 2004 |
Low-Cost Traffic Analysis of Tor (local cached copy) Steven J. Murdoch, George Danezis, Oakland 2005 |
Hot or Not: Revealing Hidden Services by their Clock Skew (local cached copy) Steven J. Murdoch, CCS 2006 |
Ecash and credentials |
Blind Signatures for Untraceable Payments (local cached copy) David Chaum, Crypto 1982 |
A Description of Protocols for Private Credentials (local cached copy) Ariel Glenn, Ian Goldberg, Frederic Legare, Anton Stiglic, Technical Report, 2001 |
Compact E-Cash (local cached copy) Jan Camenisch, Susan Hohenberger, Anna Lysyanskaya, Eurocrypt 2005 |
How to win the clonewars: efficient periodic n-times anonymous authentication (local cached copy) Jan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, Mira Meyerovich, CCS 2006 |
Privacy for Public Transportation (local cached copy) Thomas Heydt-Benjamin, Hee-Jin Chae, Benessa Defend, Kevin Fu, PET 2006 |
Endorsed E-Cash (local cached copy) Jan Camenisch, Anna Lysyanskaya, Mira Meyerovich, Oakland 2007 |
Private Information Retrieval |
Private Information Retrieval: An Overview And Current Trends (local cached copy) Dmitri Asonov, ECDPvA Workshop, Informatik 2001 |
Private Information Retrieval (local cached copy) Benny Chor, Oded Goldreich, Eyal Kushilevitz, Madhu Sudan, FOCS 1995 |
Computationally private information retrieval (local cached copy) Benny Chor, Niv Gilboa, STOC 1997 |
On the Computational Practicality of Private Information Retrieval (local cached copy) Radu Sion, Bogdan Carbunar, NDSS 2007 |
Robust information-theoretic private information retrieval (local cached copy) A. Beimel, Y. Stahl, 3rd Conference on Security in Communication Networks, 2002 |
Private keyword-based push and pull with applications to anonymous communication (local cached copy) L. Kissner, A. Oprea, M. Reiter, D. Song, K. Yang, Applied Cryptography and Network Security, 2004 |
The Pynchon Gate: A Secure Method of Pseudonymous Mail Retrieval (local cached copy) Len Sassaman, Bram Cohen, Nick Mathewson, WPES 2005 |
Improving the Robustness of Private Information Retrieval (local cached copy) Ian Goldberg, Oakland 2007 |