Auditable privacy: On tamper-evident mix networks

4Citations
Citations of this article
26Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We introduce the notion of tamper-evidence for mix networks in order to defend against attacks aimed at covertly leaking secret information held by corrupted mix servers. This is achieved by letting observers (which need not be trusted) verify the absence of covert channels by means of techniques we introduce herein. Our tamper-evident mix network is a type of re-encryption mixnet in which a server proves that the permutation and re-encryption factors that it uses are correctly derived from a random seed to which the server is committed. © IFCA/Springer-Verlag Berlin Heidelberg 2006.

Cite

CITATION STYLE

APA

Choi, J. Y., Golle, P., & Jakobsson, M. (2006). Auditable privacy: On tamper-evident mix networks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4107 LNCS, pp. 126–141). Springer Verlag. https://doi.org/10.1007/11889663_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free