CS 854: Hot Topics in Privacy Enhancing Technologies

Suggested Reading List

This is a list of papers we will discuss in class. Feel free to suggest any others you may find appropriate. A good starting point for finding papers in this area is Free Haven's Selected Papers in Anonymity site.

Privacy
'I've Got Nothing to Hide' and Other Misunderstandings of Privacy (local cached copy)
Daniel J. Solove, San Diego Law Review, Vol. 44, 2007
A Classification for Privacy Techniques (local cached copy)
Carlisle Adams, University of Ottawa Law & Technology Journal 3, 2006
PETs for the Internet
Privacy-enhancing Technologies for the Internet (local cached copy)
Ian Goldberg, David Wagner, Eric Brewer, IEEE COMPCON 1997
Privacy-enhancing technologies for the Internet, II: Five years later (local cached copy)
Ian Goldberg, PET 2002
Privacy-enhancing technologies for the Internet III: Ten years later (local cached copy)
Ian Goldberg, "Digital Privacy: Theory, Technologies and Practices", Alessandro Acquisti, Stefanos Gritzalis, Costas Lambrinoudakis, and Sabrina De Capitani di Vimercati, editors, 2007
Anonymity and Pseudonymity
Untraceable electronic mail, return addresses, and digital pseudonyms (local cached copy)
D. Chaum, Communications of the ACM, 1981
Crowds: Anonymity for Web Transactions (local cached copy)
M. Reiter, A. Rubin, ACM TISSEC, 1998
Mixminion: Design of a Type III Anonymous Remailer Protocol (local cached copy)
G. Danezis, R. Dingledine, N. Mathewson, IEEE SSP (Oakland) 2003
On the Economics of Anonymity (local cached copy)
Alessandro Acquisti, Roger Dingledine, Paul Syverson, FC 2003
Towards an Analysis of Onion Routing Security (local cached copy)
P. Syverson, G. Tsudik, M. Reed, C. Landwehr, PET 2000
Tor: The Second-Generation Onion Router (local cached copy)
R.Dingledine, N.Mathewson, P.Syverson, USENIX Security, 2004
Privacy in P2P networks
The Sybil Attack (local cached copy)
J. Douceur, IPTPS 2002
Tarzan: A Peer-to-Peer Anonymizing Network Layer (local cached copy)
M.J. Freedman, R. Morris, CCS 2002
Introducing MorphMix: Peer-to-Peer based Anonymous Internet Usage with Collusion Detection (local cached copy)
Marc Rennhard, Bernhard Plattner, WPES 2002
Breaking the Collusion Detection Mechanism of MorphMix (local cached copy)
Parisa Tabriz, Nikita Borisov, PET 2006
Censorship Resistance
The Eternity Service (local cached copy)
R. Anderson, Pragocrypt 1996
Publius: A robust, tamper-evident, censorship-resistant and source-anonymous web publishing system (local cached copy)
Marc Waldman, Aviel Rubin, Lorrie Cranor, Usenix Security 2000
The Free Haven Project: Distributed Anonymous Storage Service (local cached copy)
Roger Dingledine, Michael J. Freedman, David Molnar, PET 2000
Freenet: A Distributed Anonymous Information Storage and Retrieval System (local cached copy)
Ian Clarke, Oskar Sandberg, Brandon Wiley, Theodore W. Hong, PET 2000
Traffic Analysis
Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems (local cached copy)
Jean-François Raymond, PET 2000
Towards measuring anonymity (local cached copy)
Claudia Díaz, Stefaan Seys, Joris Claessens, Bart Preneel, PET 2002
Towards an Information Theoretic Metric for Anonymity (local cached copy)
Andrei Serjantov, George Danezis, PET 2002
An Analysis of the Degradation of Anonymous Protocols (local cached copy)
M. Wright, M. Adler, B.N. Levine, C. Shields, NDSS 2002
Practical Traffic Analysis: Extending and Resisting Statistical Disclosure (local cached copy)
N. Mathewson, R. Dingledine, PET 2004
Low-Cost Traffic Analysis of Tor (local cached copy)
Steven J. Murdoch, George Danezis, Oakland 2005
Hot or Not: Revealing Hidden Services by their Clock Skew (local cached copy)
Steven J. Murdoch, CCS 2006
Ecash and credentials
Blind Signatures for Untraceable Payments (local cached copy)
David Chaum, Crypto 1982
A Description of Protocols for Private Credentials (local cached copy)
Ariel Glenn, Ian Goldberg, Frederic Legare, Anton Stiglic, Technical Report, 2001
Compact E-Cash (local cached copy)
Jan Camenisch, Susan Hohenberger, Anna Lysyanskaya, Eurocrypt 2005
How to win the clonewars: efficient periodic n-times anonymous authentication (local cached copy)
Jan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, Mira Meyerovich, CCS 2006
Privacy for Public Transportation (local cached copy)
Thomas Heydt-Benjamin, Hee-Jin Chae, Benessa Defend, Kevin Fu, PET 2006
Endorsed E-Cash (local cached copy)
Jan Camenisch, Anna Lysyanskaya, Mira Meyerovich, Oakland 2007
Private Information Retrieval
Private Information Retrieval: An Overview And Current Trends (local cached copy)
Dmitri Asonov, ECDPvA Workshop, Informatik 2001
Private Information Retrieval (local cached copy)
Benny Chor, Oded Goldreich, Eyal Kushilevitz, Madhu Sudan, FOCS 1995
Computationally private information retrieval (local cached copy)
Benny Chor, Niv Gilboa, STOC 1997
On the Computational Practicality of Private Information Retrieval (local cached copy)
Radu Sion, Bogdan Carbunar, NDSS 2007
Robust information-theoretic private information retrieval (local cached copy)
A. Beimel, Y. Stahl, 3rd Conference on Security in Communication Networks, 2002
Private keyword-based push and pull with applications to anonymous communication (local cached copy)
L. Kissner, A. Oprea, M. Reiter, D. Song, K. Yang, Applied Cryptography and Network Security, 2004
The Pynchon Gate: A Secure Method of Pseudonymous Mail Retrieval (local cached copy)
Len Sassaman, Bram Cohen, Nick Mathewson, WPES 2005
Improving the Robustness of Private Information Retrieval (local cached copy)
Ian Goldberg, Oakland 2007