Sherman S. M. Chow, Jack P. K. Ma & Tsz Hon Yuen
Abstract:
Securely maintaining “credits” of users judging their behavior in past authenticated sessions is vital to
encourage user participation, but doing it over anonymous credentials is non-trivial, especially when users would
avoid claiming negative credit and escape from blocklisting. Prevalent designs impose an authentication cost
linear in the blocklist size or a stringent requirement of sequential and timely judgment of each session without
retrospective adjustment, as a single unjudged session curbs the authentication of all users. We propose scored
anonymous credentials, a new design storing a number of active sessions with volatile scores downgradable before
finalized. Sessions can be judged in any order and at varying times without affecting all users. Any backlog of
unjudged sessions only affects the users behind them. We achieve efficiency and flexibility using verifiable
shuffle, which is hardly used in existing anonymous blocklisting/reputation enforcement systems.
References
- Abe, M., Chow, S.S.M., Haralambiev, K., Ohkubo, M.: Double-trapdoor
anonymous tags for traceable signatures. Int. J. Inf. Secur. 12(1), 19–31
(2013)
- Acar, T., Chow, S.S.M., Nguyen, L.: Accumulators and U-prove
revocation. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp.
189–196. Springer, Heidelberg (2013).
https://doi.org/10.1007/978-3-642-39884-1_15
- Acar, T., Nguyen, L.: Revocation for delegatable anonymous
credentials. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.)
PKC 2011. LNCS, vol. 6571, pp. 423–440. Springer, Heidelberg (2011).
https://doi.org/10.1007/978-3-642-19379-8_26
- Au, M.H., Kapadia, A.: PERM: practical reputation-based blacklisting
without TTPs. In: CCS, pp. 929–940 (2012)
- Au, M.H., Kapadia, A., Susilo, W.: BLACR: TTP-free blacklistable
anonymous credentials with reputation. In: NDSS (2012)
- Au, M.H., Susilo, W., Mu, Y., Chow, S.S.M.: Constant-size dynamic
k-times anonymous authentication. IEEE Syst. J. 7(2), 249–261 (2013)
- Backes, M., Hanzlik, L., Schneider-Bensch, J.: Membership privacy
for fully dynamic group signatures. In: CCS, pp. 2181–2198 (2019)
- Barki, A., Brunet, S., Desmoulins, N., Traoré, J.: Improved
algebraic MACs and practical keyed-verification anonymous credentials. In:
Avanzi, R., Heys, H. (eds.) SAC 2016. LNCS, vol. 10532, pp. 360–380.
Springer, Cham (2017). https://doi.org/10.1007/978-3-319-69453-5_20
- Bayer, S., Groth, J.: Efficient zero-knowledge argument for
correctness of a shuffle. In: Pointcheval, D., Johansson, T. (eds.)
EUROCRYPT 2012. LNCS, vol. 7237, pp. 263–280. Springer, Heidelberg (2012).
https://doi.org/10.1007/978-3-642-29011-4_17
- Bernstein, M.S., Monroy-Hernández, A., Harry, D., André, P.,
Panovich, K., Vargas, G.G.: 4chan and /b/: An analysis of anonymity and
ephemerality in a large online community. In: AAAI Conference on Web and
Social Media (ICWSM) (2011)
- Boneh, D., Boyen, X.: Short signatures without random oracles and
the SDH assumption in bilinear groups. J. Cryptol. 21(2), 149–177
(2008)
- Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In:
Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41–55. Springer,
Heidelberg (2004). https://doi.org/10.1007/978-3-540-28628-8_3
- Brickell, E., Li, J.: Enhanced Privacy ID: a direct anonymous
attestation scheme with enhanced revocation capabilities. In: WPES, pp.
21–30 (2007)
- Bünz, B., Bootle, J., Boneh, D., Poelstra, A., Wuille, P., Maxwell,
G.: Bulletproofs: short proofs for confidential transactions and more. In:
S & P. pp. 315–334 (2018)
- Camenisch, J., Chaabouni, R., Shelat, A.: Efficient protocols for
set membership and range proofs. In: Pieprzyk, J. (ed.) ASIACRYPT 2008.
LNCS, vol. 5350, pp. 234–252. Springer, Heidelberg (2008).
https://doi.org/10.1007/978-3-540-89255-7_15
- Camenisch, J., Drijvers, M., Hajny, J.: Scalable revocation scheme
for anonymous credentials based on n-times unlinkable proofs. In: WPES,
pp. 123–133 (2016)
- Camenisch, J., Kohlweiss, M., Soriente, C.: Solving revocation with
efficient update of anonymous credentials. In: Garay, J.A., De Prisco, R.
(eds.) SCN 2010. LNCS, vol. 6280, pp. 454–471. Springer, Heidelberg
(2010). https://doi.org/10.1007/978-3-642-15317-4_28
- Camenisch, J., Lysyanskaya, A.: An efficient system for
non-transferable anonymous credentials with optional anonymity revocation.
In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 93–118.
Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-44987-6_7
- Camenisch, J., Lysyanskaya, A.: Dynamic accumulators and application
to efficient revocation of anonymous credentials. In: Yung, M. (ed.)
CRYPTO 2002. LNCS, vol. 2442, pp. 61–76. Springer, Heidelberg (2002).
https://doi.org/10.1007/3-540-45708-9_5
- Camenisch, J., Stadler, M.: Efficient group signature schemes for
large groups (extended abstract). In: Kaliski, B.S. (ed.) CRYPTO 1997.
LNCS, vol. 1294, pp. 410–424. Springer, Heidelberg (1997).
https://doi.org/10.1007/BFb0052252
- Chase, M., Meiklejohn, S., Zaverucha, G.: Algebraic MACs and
keyed-verification anonymous credentials. In: CCS, pp. 1205–1216
(2014)
- Chow, S.S.M.: Real traceable signatures. In: Jacobson, M.J., Rijmen,
V., Safavi-Naini, R. (eds.) SAC 2009. LNCS, vol. 5867, pp. 92–107.
Springer, Heidelberg (2009).
https://doi.org/10.1007/978-3-642-05445-7_6
- Chow, S.S.M., Egger, C., Lai, R.W.F., Ronge, V., Woo, I.K.Y.: On
sustainable ring-based anonymous systems. In: IEEE Computer Security
Foundations (CSF) Symposium (2023)
- Chow, S.S.M., Liu, J.K., Wong, D.S.: Robust receipt-free election
system with ballot secrecy and verifiability. In: NDSS (2008)
- Chow, S.S.M., Susilo, W., Yuen, T.H.: Escrowed linkability of ring
signatures and its applications. In: Nguyen, P.Q. (ed.) VIETCRYPT 2006.
LNCS, vol. 4341, pp. 175–192. Springer, Heidelberg (2006).
https://doi.org/10.1007/11958239_12
- Chow, S.S.M., Zhang, H., Zhang, T.: Real hidden identity-based
signatures. In: Kiayias, A. (ed.) FC 2017. LNCS, vol. 10322, pp. 21–38.
Springer, Cham (2017). https://doi.org/10.1007/978-3-319-70972-7_2
- Couteau, G., Reichle, M.: Non-interactive keyed-verification
anonymous credentials. In: Lin, D., Sako, K. (eds.) PKC 2019. LNCS, vol.
11442, pp. 66–96. Springer, Cham (2019).
https://doi.org/10.1007/978-3-030-17253-4_3
- Derler, D., Hanser, C., Slamanig, D.: A new approach to efficient
revocable attribute-based anonymous credentials. In: Groth, J. (ed.) IMACC
2015. LNCS, vol. 9496, pp. 57–74. Springer, Cham (2015).
https://doi.org/10.1007/978-3-319-27239-9_4
- Dingledine, R., Mathewson, N., Syverson, P.F.: Tor: the
second-generation onion router. In: USENIX Security Symposium, pp. 303–320
(2004)
- Doerner, J., Kondi, Y., Lee, E., abhi shelat, Tyner, L.: Threshold
BBS+ signatures for distributed anonymous credential issuance. In: S & P.
pp. 2095–2111 (2023)
- Ferrara, A.L., Green, M., Hohenberger, S., Pedersen, M.Ø.: Practical
short signature batch verification. In: Fischlin, M. (ed.) CT-RSA 2009.
LNCS, vol. 5473, pp. 309–324. Springer, Heidelberg (2009).
https://doi.org/10.1007/978-3-642-00862-7_21
- Fiore, D., Garms, L., Kolonelos, D., Soriente, C., Tucker, I.: Ring
signatures with user-controlled linkability. In: Atluri, V., Di Pietro,
R., Jensen, C.D., Meng, W. (eds.) ESORICS Part II. LNCS, vol. 13555, pp.
405–426. Springer, Cham (2022).
https://doi.org/10.1007/978-3-031-17146-8_20
- Gurtler, S., Goldberg, I.: SoK: privacy-preserving reputation
systems. Proc. Priv. Enhancing Technol. 2021(1), 107–127 (2021)
- Hajny, J., Dzurenda, P., Marques, R.C., Malina, L.: Privacy ABCs:
now ready for your wallets! In: PerCom Workshops, pp. 686–691 (2021)
- Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation
systems for online service provision. Decis. Support Syst. 43(2), 618–644
(2007)
- Lai, R.W.F., Cheung, K., Chow, S.S.M., So, A.M.: Another look at
anonymous communication. IEEE Trans. Depend. Secur. Comput. 16(5), 731–742
(2019)
- Lai, R.W.F., Ronge, V., Ruffing, T., Schröder, D., Thyagarajan,
S.A.K., Wang, J.: Omniring: scaling private payments without trusted
setup. In: CCS, pp. 31–48 (2019)
- Lofgren, P., Hopper, N.: FAUST: efficient, TTP-free abuse prevention
by anonymous whitelisting. In: WPES, pp. 125–130 (2011)
- Ma, J.P.K., Chow, S.S.M.: SMART credentials in the multi-queue of
slackness (or Secure management of anonymous reputation traits without
global halting). In: IEEE European Symposium on Security and Privacy
(EuroS&P), pp. 896-912 (2023)
- Mittal, P., Olumofin, F.G., Troncoso, C., Borisov, N., Goldberg, I.:
PIR-Tor: scalable anonymous communication using private information
retrieval. In: USENIX Security Symposium (2011)
- Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In:
IEEE Symposium on Security and Privacy, pp. 173–187 (2009)
- Papamanthou, C., Tamassia, R., Triandopoulos, N.: Optimal
verification of operations on dynamic sets. In: Rogaway, P. (ed.) CRYPTO
2011. LNCS, vol. 6841, pp. 91–110. Springer, Heidelberg (2011).
https://doi.org/10.1007/978-3-642-22792-9_6
- Rosenberg, M., Maller, M., Miers, I.: SNARKBlock: federated
anonymous blocklisting from hidden common input aggregate proofs. In: IEEE
Symposium on Security and Privacy (S&P), pp. 1290–1307 (2022)
- Tsang, P.P., Au, M.H., Kapadia, A., Smith, S.W.: Blacklistable
anonymous credentials: Blocking misbehaving users without TTPs. In: CCS,
pp. 72–81 (2007)
- Tsang, P.P., Au, M.H., Kapadia, A., Smith, S.W.: PEREA: towards
practical TTP-free revocation in anonymous authentication. In: CCS, pp.
333–344 (2008)
- Xi, L., Feng, D.: FARB: fast anonymous reputation-based blacklisting
without TTPs. In: WPES, pp. 139–148 (2014)
- Yu, K.Y., Yuen, T.H., Chow, S.S.M., Yiu, S.M., Hui, L.C.K.: PE(AR)2:
privacy-enhanced anonymous authentication with reputation and revocation.
In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol.
7459, pp. 679–696. Springer, Heidelberg (2012).
https://doi.org/10.1007/978-3-642-33167-1_39
- Zhang, T., Wu, H., Chow, S.S.M.: Structure-preserving
certificateless encryption and its application. In: Matsui, M. (ed.)
CT-RSA 2019. LNCS, vol. 11405, pp. 1–22. Springer, Cham (2019).
https://doi.org/10.1007/978-3-030-12612-4_1