Publication:
Inonymous: anonymous invitation-based system

dc.contributor.departmentDepartment of Computer Engineering
dc.contributor.departmentGraduate School of Sciences and Engineering
dc.contributor.kuauthorBoshrooyeh, Sanaz Taheri
dc.contributor.kuauthorKüpçü, Alptekin
dc.contributor.schoolcollegeinstituteCollege of Engineering
dc.contributor.schoolcollegeinstituteGRADUATE SCHOOL OF SCIENCES AND ENGINEERING
dc.date.accessioned2024-11-09T23:46:51Z
dc.date.issued2017
dc.description.abstractIn invitation-based systems, a user is allowed to join upon receipt of a certain number of invitations from the existing members. The system administrator approves the new membership if he authenticates the inviters and the invitations, knowing who is invited by whom. However, the inviter-invitee relationship is privacy-sensitive information and can be exploited for inference attacks: The invitee's profile (e.g., political view or location) might leak through the inviters' profiles. To cope with this problem, we propose Inonymous, an anonymous invitationbased system where the administrator and the existing members do not know who is invited by whom. We formally define and prove the inviter anonymity against honest but curious adversaries and the information theoretic unforgeability of invitations. Inonymous is efficiently scalable in the sense that once a user joins the system, he can immediately act as an inviter, without re-keying and imposing overhead on the existing members. We also present InonymouX, an anonymous cross-network invitation-based system where users join one network (e.g., Twitter) using invitations of members of another network (e.g., Facebook).
dc.description.indexedbyWOS
dc.description.indexedbyScopus
dc.description.openaccessNO
dc.description.publisherscopeInternational
dc.description.sponsoredbyTubitakEuEU
dc.description.sponsorshipRoyal Society of UK Newton Advanced Fellowship [NA140464]
dc.description.sponsorshipEuropean Union COST Action [IC1306] We acknowledge the support of the Royal Society of UK Newton Advanced Fellowship NA140464 and European Union COST Action IC1306.
dc.description.volume10436
dc.identifier.doi10.1007/978-3-319-67816-0_13
dc.identifier.eissn1611-3349
dc.identifier.isbn978-3-319-67816-0
dc.identifier.isbn978-3-319-67815-3
dc.identifier.issn0302-9743
dc.identifier.scopus2-s2.0-85030165840
dc.identifier.urihttps://doi.org/10.1007/978-3-319-67816-0_13
dc.identifier.urihttps://hdl.handle.net/20.500.14288/14028
dc.identifier.wos463362100013
dc.keywordsInvitation-based system
dc.keywordsAnonymity
dc.keywordsUnforgeability
dc.keywordsCross-network invitation
dc.language.isoeng
dc.publisherSpringer International Publishing Ag
dc.relation.ispartofData Privacy Management, Cryptocurrencies and Blockchain Technology
dc.subjectComputer Science
dc.subjectTelecommunications
dc.titleInonymous: anonymous invitation-based system
dc.typeConference Proceeding
dspace.entity.typePublication
local.contributor.kuauthorBoshrooyeh, Sanaz Taheri
local.contributor.kuauthorKüpçü, Alptekin
local.publication.orgunit1GRADUATE SCHOOL OF SCIENCES AND ENGINEERING
local.publication.orgunit1College of Engineering
local.publication.orgunit2Department of Computer Engineering
local.publication.orgunit2Graduate School of Sciences and Engineering
relation.isOrgUnitOfPublication89352e43-bf09-4ef4-82f6-6f9d0174ebae
relation.isOrgUnitOfPublication3fc31c89-e803-4eb1-af6b-6258bc42c3d8
relation.isOrgUnitOfPublication.latestForDiscovery89352e43-bf09-4ef4-82f6-6f9d0174ebae
relation.isParentOrgUnitOfPublication8e756b23-2d4a-4ce8-b1b3-62c794a8c164
relation.isParentOrgUnitOfPublication434c9663-2b11-4e66-9399-c863e2ebae43
relation.isParentOrgUnitOfPublication.latestForDiscovery8e756b23-2d4a-4ce8-b1b3-62c794a8c164

Files