• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 293
Next 10 →

An Efficient Mix-Net

by Douglas Wikström , 2002
"... We describe an efficient mix-net. Its efficiency is based on a novel method, double... ..."
Abstract - Cited by 3 (1 self) - Add to MetaCart
We describe an efficient mix-net. Its efficiency is based on a novel method, double...

On the security of mix-nets and hierarchical group signatures

by Douglas Wikström - PHD THESIS, KTH, NUMERICAL ANALYSIS AND COMPUTER SCIENCE , 2005
"... In this thesis we investigate two separate cryptographic notions: mix-nets and hierarchical group signatures. The former notion was introduced by Chaum (1981). The latter notion is introduced in this thesis, but it generalizes the notion of group signatures which was introduced by Chaum and Heyst (1 ..."
Abstract - Add to MetaCart
. (2002). Then we provide the first definition of security of a mix-net in the universally composable security framework (UC-framework) introduced by Canetti (2001). We construct two distinct efficient mix-nets that are provably secure under standard assumptions in the UC-framework against an adversary

Four Practical Attacks for "Optimistic Mixing for Exit-Polls"

by Douglas Wikström , 2003
"... Golle, Zhong, Boneh, Jakobsson, and Juels [10] recently presented a very efficient mix-net, that they claim to be both robust, and secure. We present four practical attacks for their mix-net, and break both its privacy and robustness. Each attack exploits and illustrates a separate weakness of the p ..."
Abstract - Cited by 29 (4 self) - Add to MetaCart
Golle, Zhong, Boneh, Jakobsson, and Juels [10] recently presented a very efficient mix-net, that they claim to be both robust, and secure. We present four practical attacks for their mix-net, and break both its privacy and robustness. Each attack exploits and illustrates a separate weakness

A reputation system to increase MIX-net reliability

by Roger Dingledine, Michael J. Freedman, David Hopwood, David Molnar - Information Hiding (IH 2001 , 2001
"... Abstract. We describe a design for a reputation system that increases the reliability and thus efficiency of remailer services. Our reputation system uses a MIX-net in which MIXes give receipts for intermediate messages. Together with a set of witnesses, these receipts allow senders to verify the co ..."
Abstract - Cited by 61 (12 self) - Add to MetaCart
Abstract. We describe a design for a reputation system that increases the reliability and thus efficiency of remailer services. Our reputation system uses a MIX-net in which MIXes give receipts for intermediate messages. Together with a set of witnesses, these receipts allow senders to verify

A new attack on Jakobsson Hybrid Mix-Net

by Seyyed Amir Mortazavi
"... The Jakobsson hybrid Mix-net proposed by Jakobsson and Juels, is a very practical and efficient scheme for long input messages. But this hybrid Mix-net does not have public verifiable property. In this paper a new attack to the Jakobsson hybrid Mix-net is introduced. This attack breaks the robustnes ..."
Abstract - Add to MetaCart
The Jakobsson hybrid Mix-net proposed by Jakobsson and Juels, is a very practical and efficient scheme for long input messages. But this hybrid Mix-net does not have public verifiable property. In this paper a new attack to the Jakobsson hybrid Mix-net is introduced. This attack breaks

Randomized Partial Checking Revisited

by Shahram Khazaei, Douglas Wikström , 2012
"... We study mix-nets with randomized partial checking (RPC) as proposed by Jakobsson, Juels, and Rivest (2002). RPC is a technique to verify the correctness of an execution both for Chaumian and homomorphic mix-nets. The idea is to relax the correctness and privacy requirements to achieve a more effici ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
efficient mix-net. We identify serious issues in the original description of mix-nets with RPC and show how to exploit these to break both correctness and privacy, both for Chaumian and homomorphic mix-nets. Our attacks are practical and applicable to real world mix-net implementations, e.g., the Civitas

Random block verification: Improving the norwegian electoral mix-net

by Denise Demirel, Hugo Jonker, Melanie Volkamer , 2012
"... The VALG project is introducing e-voting to municipal and county elections to Norway. Part of the e-voting system is a mix-net along the lines of Puiggalí et al.- a mix-net which can be efficiently verified by combining the benefits of optimistic mixing and randomized partial checking. This paper ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
The VALG project is introducing e-voting to municipal and county elections to Norway. Part of the e-voting system is a mix-net along the lines of Puiggalí et al.- a mix-net which can be efficiently verified by combining the benefits of optimistic mixing and randomized partial checking. This paper

A Sender Verifiable Mix-Net and a New Proof of a Shuffle

by Douglas Wikström , 2005
"... We introduce the first El Gamal based mix-net in which each mix-server partially decrypts and permutes its input, i.e., no reencryption is necessary. An interesting property of the construction is that a sender can verify non-interactively that its message is processed correctly. We call this sende ..."
Abstract - Cited by 12 (2 self) - Add to MetaCart
We introduce the first El Gamal based mix-net in which each mix-server partially decrypts and permutes its input, i.e., no reencryption is necessary. An interesting property of the construction is that a sender can verify non-interactively that its message is processed correctly. We call

Mix-nets: Factored Mixtures of Gaussians in Bayesian Networks with Mixed Continuous And Discrete Variables

by Scott Davies, Andrew Moore , 2000
"... Recently developed techniques have made it possible to quickly learn accurate probability density functions from data in low-dimensional continuous spaces. In particular, mixtures of Gaussians can be fitted to data very quickly using an accelerated EM algorithm that employs multiresolution kd-trees ..."
Abstract - Cited by 12 (2 self) - Add to MetaCart
between discrete variables and continuous variables without requiring discretization of the continuous variables. We present efficient heuristic algorithms for automatically learning these networks from data, and perform comparative experiments illustrating how well these networks model real scientific

Four Practical Attacks for “Optimistic Mixing for Exit-Polls”

by unknown authors , 2003
"... Golle, Zhong, Boneh, Jakobsson, and Juels [10] recently presented a very efficient mix-net, that they claim to be both robust, and secure. We present four practical attacks for their mix-net, and break both its privacy and robustness. Each attack exploits and illustrates a separate weakness of the p ..."
Abstract - Add to MetaCart
Golle, Zhong, Boneh, Jakobsson, and Juels [10] recently presented a very efficient mix-net, that they claim to be both robust, and secure. We present four practical attacks for their mix-net, and break both its privacy and robustness. Each attack exploits and illustrates a separate weakness
Next 10 →
Results 1 - 10 of 293
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2016 The Pennsylvania State University