We introduce the notion of tamper-evidence for mix networks in order to defend against attacks aimed at covertly leaking secret information held by corrupted mix servers. This is achieved by letting observers (which need not be trusted) verify the absence of covert channels by means of techniques we introduce herein. Our tamper-evident mix network is a type of re-encryption mixnet in which a server proves that the permutation and re-encryption factors that it uses are correctly derived from a random seed to which the server is committed. © IFCA/Springer-Verlag Berlin Heidelberg 2006.
CITATION STYLE
Choi, J. Y., Golle, P., & Jakobsson, M. (2006). Auditable privacy: On tamper-evident mix networks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4107 LNCS, pp. 126–141). Springer Verlag. https://doi.org/10.1007/11889663_9
Mendeley helps you to discover research relevant for your work.