Publication:
Anonyma: anonymous invitation-only registration in malicious adversarial model

dc.contributor.departmentGraduate School of Sciences and Engineering
dc.contributor.departmentDepartment of Computer Engineering
dc.contributor.kuauthorBoshrooyeh, Sanaz Taheri
dc.contributor.kuauthorKüpçü, Alptekin
dc.contributor.kuauthorÖzkasap, Öznur
dc.contributor.schoolcollegeinstituteGRADUATE SCHOOL OF SCIENCES AND ENGINEERING
dc.contributor.schoolcollegeinstituteCollege of Engineering
dc.date.accessioned2025-12-31T08:18:40Z
dc.date.available2025-12-31
dc.date.issued2025
dc.description.abstractIn invitation-based systems, a new user can register only after obtaining a threshold number of invitations from existing members. The newcomer submits these invitations to the system administrator, who verifies their legitimacy. In doing so, the administrator inevitably learns who invited whom. This inviter–invitee relationship is itself privacy-sensitive information, since knowledge of it can enable inference attacks in which an invitee’s profile (e.g., political views or location) is deduced from the profiles of their inviters. To address this problem, we propose (Formula presented), an anonymous invitation-based system in which even a corrupted administrator, colluding with a subset of members, cannot determine inviter–invitee relationships. We formally define the notions of inviter anonymity and invitation unforgeability, and provide formal proofs that (Formula presented) achieves both against a malicious and adaptive adversary. Our design ensures constant cost for authenticating new registrations, unlike existing approaches where invitation generation and verification incur overhead linear in the total number of members. Moreover, (Formula presented) scales efficiently: once a user joins, the administrator can immediately issue credentials enabling the newcomer to act as an inviter without re-keying existing members. We also design (Formula presented), a cross-network extension that supports anonymous third-party authentication, allowing invitations issued in one system to be used for registration in another.
dc.description.fulltextYes
dc.description.harvestedfromManual
dc.description.indexedbyScopus
dc.description.indexedbyWOS
dc.description.publisherscopeInternational
dc.description.readpublishN/A
dc.description.sponsoredbyTubitakEuTÜBİTAK
dc.description.sponsorshipWe acknowledge the support of the Turkish Academy of Sciences, Turkey, The Royal Society of UK Newton Advanced Fellowship NA140464, and TÜBİTAK (the Scientific and Technological Research Council of Türkiye ).
dc.identifier.doi10.1016/j.jnca.2025.104337
dc.identifier.eissn1084-8045
dc.identifier.embargoNo
dc.identifier.grantno123E462
dc.identifier.grantno121C338
dc.identifier.issn1095-8592
dc.identifier.quartileQ1
dc.identifier.scopus2-s2.0-105018073613
dc.identifier.urihttps://doi.org/10.1016/j.jnca.2025.104337
dc.identifier.urihttps://hdl.handle.net/20.500.14288/31382
dc.identifier.volume244
dc.identifier.wos001590492000001
dc.keywordsAnonymity
dc.keywordsCross-network invitation
dc.keywordsIntegrity
dc.keywordsInvitation-based system
dc.keywordsMalicious adversary
dc.keywordsThird-party authentication
dc.keywordsUnforgeability
dc.language.isoeng
dc.publisherElsevier
dc.relation.affiliationKoç University
dc.relation.collectionKoç University Institutional Repository
dc.relation.ispartofJournal of Network and Computer Applications
dc.relation.openaccessYes
dc.rightsCC BY-NC-ND (Attribution-NonCommercial-NoDerivs)
dc.rights.urihttps://creativecommons.org/licenses/by-nc-nd/4.0/
dc.subjectComputer science
dc.titleAnonyma: anonymous invitation-only registration in malicious adversarial model
dc.typeJournal Article
dspace.entity.typePublication
person.familyNameBoshrooyeh
person.familyNameKüpçü
person.familyNameÖzkasap
person.givenNameSanaz Taheri
person.givenNameAlptekin
person.givenNameÖznur
relation.isOrgUnitOfPublication3fc31c89-e803-4eb1-af6b-6258bc42c3d8
relation.isOrgUnitOfPublication89352e43-bf09-4ef4-82f6-6f9d0174ebae
relation.isOrgUnitOfPublication.latestForDiscovery3fc31c89-e803-4eb1-af6b-6258bc42c3d8
relation.isParentOrgUnitOfPublication434c9663-2b11-4e66-9399-c863e2ebae43
relation.isParentOrgUnitOfPublication8e756b23-2d4a-4ce8-b1b3-62c794a8c164
relation.isParentOrgUnitOfPublication.latestForDiscovery434c9663-2b11-4e66-9399-c863e2ebae43

Files