Publication: (Formula presented) : Anonymous invitation-only registration in malicious adversarial model
| dc.contributor.coauthor | Taheri-Boshrooyeh, Sanaz (56926731400) | |
| dc.contributor.coauthor | Küpçü, Alptekin (26531375100) | |
| dc.contributor.coauthor | Özkasap, Öznur (6602394621) | |
| dc.date.accessioned | 2025-12-31T08:18:40Z | |
| dc.date.available | 2025-12-31 | |
| dc.date.issued | 2025 | |
| dc.description.abstract | In invitation-based systems, a new user can register only after obtaining a threshold number of invitations from existing members. The newcomer submits these invitations to the system administrator, who verifies their legitimacy. In doing so, the administrator inevitably learns who invited whom. This inviter–invitee relationship is itself privacy-sensitive information, since knowledge of it can enable inference attacks in which an invitee’s profile (e.g., political views or location) is deduced from the profiles of their inviters. To address this problem, we propose (Formula presented), an anonymous invitation-based system in which even a corrupted administrator, colluding with a subset of members, cannot determine inviter–invitee relationships. We formally define the notions of inviter anonymity and invitation unforgeability, and provide formal proofs that (Formula presented) achieves both against a malicious and adaptive adversary. Our design ensures constant cost for authenticating new registrations, unlike existing approaches where invitation generation and verification incur overhead linear in the total number of members. Moreover, (Formula presented) scales efficiently: once a user joins, the administrator can immediately issue credentials enabling the newcomer to act as an inviter without re-keying existing members. We also design (Formula presented), a cross-network extension that supports anonymous third-party authentication, allowing invitations issued in one system to be used for registration in another. © 2025 Elsevier B.V., All rights reserved. | |
| dc.description.fulltext | Yes | |
| dc.description.harvestedfrom | Manual | |
| dc.description.indexedby | Scopus | |
| dc.description.publisherscope | International | |
| dc.description.readpublish | N/A | |
| dc.description.sponsoredbyTubitakEu | N/A | |
| dc.identifier.doi | 10.1016/j.jnca.2025.104337 | |
| dc.identifier.eissn | 1084-8045 | |
| dc.identifier.embargo | No | |
| dc.identifier.issn | 1095-8592 | |
| dc.identifier.quartile | N/A | |
| dc.identifier.scopus | 2-s2.0-105018073613 | |
| dc.identifier.uri | https://doi.org/10.1016/j.jnca.2025.104337 | |
| dc.identifier.uri | https://hdl.handle.net/20.500.14288/31382 | |
| dc.identifier.volume | 244 | |
| dc.keywords | Anonymity | |
| dc.keywords | Cross-network invitation | |
| dc.keywords | Integrity | |
| dc.keywords | Invitation-based system | |
| dc.keywords | Malicious adversary | |
| dc.keywords | Third-party authentication | |
| dc.keywords | Unforgeability | |
| dc.language.iso | eng | |
| dc.publisher | Academic Press | |
| dc.relation.affiliation | Koç University | |
| dc.relation.collection | Koç University Institutional Repository | |
| dc.relation.ispartof | Journal of Network and Computer Applications | |
| dc.relation.openaccess | Yes | |
| dc.rights | CC BY-NC-ND (Attribution-NonCommercial-NoDerivs) | |
| dc.rights.uri | https://creativecommons.org/licenses/by-nc-nd/4.0/ | |
| dc.title | (Formula presented) : Anonymous invitation-only registration in malicious adversarial model | |
| dc.type | Journal Article | |
| dspace.entity.type | Publication |
