scispace - formally typeset
Search or ask a question

Showing papers by "Michael J. Freedman published in 2001"


Book ChapterDOI
01 Jan 2001
TL;DR: In this paper, the authors present a design for a system of anonymous storage which resists the attempts of powerful adversaries to find or destroy any stored data, and enumerate distinct notions of anonymity for each party in the system, and suggest a way to classify anonymous systems based on the kinds of anonymity provided.
Abstract: We present a design for a system of anonymous storage which resists the attempts of powerful adversaries to find or destroy any stored data. We enumerate distinct notions of anonymity for each party in the system, and suggest a way to classify anonymous systems based on the kinds of anonymity provided. Our design ensures the availability of each document for a publisher-specified lifetime. A reputation system provides server accountability by limiting the damage caused from misbehaving servers. We identify attacks and defenses against anonymous storage services, and close with a list of problems which are currently unsolved.

299 citations


Book ChapterDOI
25 Apr 2001
TL;DR: A design for a reputation system that increases the reliability and thus efficiency of remailer services using a MIX-net in which MIXes give receipts for intermediate messages and together with a set of witnesses allow senders to verify the correctness of each MIX and prove misbehavior to the witnesses.
Abstract: We describe a design for a reputation system that increases the reliability and thus efficiency of remailer services. Our reputation system uses a MIX-net in which MIXes give receipts for intermediate messages. Together with a set of witnesses, these receipts allow senders to verify the correctness of each MIX and prove misbehavior to the witnesses.

88 citations


Book ChapterDOI
05 Nov 2001
TL;DR: In this paper, the authors examine the contributions that digital-rights management (DRM) technology can make to both compromising and protecting users' privacy, and argue that the privacy-enhancing technology (e.g., encryption, anonymity, and pseudonymity) that absorbs most of the attention of the security R&D community cannot by itself solve the privacy problems raised by DRM, although it can play a role in various solutions.
Abstract: Internet-based distribution of mass-market content provides great opportunities for producers, distributors, and consumers, but it may seriously threaten users’ privacy. Some of the paths to loss of privacy are quite familiar (e.g., mining of credit-card data), but some are new or much more serious than they were in earlier distribution regimes. We examine the contributions that digital-rights-management (DRM) technology can make to both compromising and protecting users’ privacy. We argue that the privacy-enhancing technology (e.g., encryption, anonymity, and pseudonymity) that absorbs most of the attention of the security R&D community cannot by itself solve the privacy problems raised by DRM, although it can play a role in various solutions. Finally, we provide a list of “privacy engineering” principles for DRM systems, some of which are easy to implement and potentially quite effective.

80 citations