Publication:
Inonymous: anonymous invitation-based system

dc.contributor.departmentDepartment of Computer Engineering
dc.contributor.departmentGraduate School of Sciences and Engineering
dc.contributor.facultymemberYes
dc.contributor.kuauthorBoshrooyeh, Sanaz Taheri
dc.contributor.kuauthorKüpçü, Alptekin
dc.contributor.schoolcollegeinstituteCollege of Engineering
dc.contributor.schoolcollegeinstituteGRADUATE SCHOOL OF SCIENCES AND ENGINEERING
dc.date.accessioned2024-11-09T23:46:51Z
dc.date.issued2017
dc.description.abstractIn invitation-based systems, a user is allowed to join upon receipt of a certain number of invitations from the existing members. The system administrator approves the new membership if he authenticates the inviters and the invitations, knowing who is invited by whom. However, the inviter-invitee relationship is privacy-sensitive information and can be exploited for inference attacks: The invitee's profile (e.g., political view or location) might leak through the inviters' profiles. To cope with this problem, we propose Inonymous, an anonymous invitationbased system where the administrator and the existing members do not know who is invited by whom. We formally define and prove the inviter anonymity against honest but curious adversaries and the information theoretic unforgeability of invitations. Inonymous is efficiently scalable in the sense that once a user joins the system, he can immediately act as an inviter, without re-keying and imposing overhead on the existing members. We also present InonymouX, an anonymous cross-network invitation-based system where users join one network (e.g., Twitter) using invitations of members of another network (e.g., Facebook).
dc.description.fulltextNo
dc.description.harvestedfromManual
dc.description.indexedbyWOS
dc.description.indexedbyScopus
dc.description.openaccessNO
dc.description.peerreviewstatusN/A
dc.description.publisherscopeInternational
dc.description.readpublishN/A
dc.description.sponsoredbyTubitakEuEU
dc.description.sponsorshipRoyal Society of UK Newton Advanced Fellowship [NA140464]
dc.description.sponsorshipEuropean Union COST Action [IC1306] We acknowledge the support of the Royal Society of UK Newton Advanced Fellowship NA140464 and European Union COST Action IC1306.
dc.description.versionN/A
dc.identifier.doi10.1007/978-3-319-67816-0_13
dc.identifier.eissn1611-3349
dc.identifier.embargoN/A
dc.identifier.grantnoIC1306
dc.identifier.isbn978-3-319-67816-0
dc.identifier.isbn978-3-319-67815-3
dc.identifier.issn0302-9743
dc.identifier.quartileBakılacak
dc.identifier.scopus2-s2.0-85030165840
dc.identifier.urihttps://doi.org/10.1007/978-3-319-67816-0_13
dc.identifier.urihttps://hdl.handle.net/20.500.14288/14028
dc.identifier.wos463362100013
dc.keywordsInvitation-based system
dc.keywordsAnonymity
dc.keywordsUnforgeability
dc.keywordsCross-network invitation
dc.language.isoeng
dc.publisherSpringer International Publishing Ag
dc.relation.affiliationKoç University
dc.relation.collectionKoç University Institutional Repository
dc.relation.ispartofData Privacy Management, Cryptocurrencies and Blockchain Technology
dc.relation.openaccessN/A
dc.rightsN/A
dc.subjectComputer Science
dc.subjectTelecommunications
dc.titleInonymous: anonymous invitation-based system
dc.typeConference Proceeding
dspace.entity.typePublication
local.contributor.kuauthorBoshrooyeh, Sanaz Taheri
local.contributor.kuauthorKüpçü, Alptekin
relation.isGoalOfPublication0e554614-34c1-41f1-b6c4-0096c1d59305
relation.isGoalOfPublication.latestForDiscovery0e554614-34c1-41f1-b6c4-0096c1d59305
relation.isOrgUnitOfPublication89352e43-bf09-4ef4-82f6-6f9d0174ebae
relation.isOrgUnitOfPublication3fc31c89-e803-4eb1-af6b-6258bc42c3d8
relation.isOrgUnitOfPublication.latestForDiscovery89352e43-bf09-4ef4-82f6-6f9d0174ebae
relation.isParentOrgUnitOfPublication8e756b23-2d4a-4ce8-b1b3-62c794a8c164
relation.isParentOrgUnitOfPublication434c9663-2b11-4e66-9399-c863e2ebae43
relation.isParentOrgUnitOfPublication.latestForDiscovery8e756b23-2d4a-4ce8-b1b3-62c794a8c164

Files