Mixnet optimization methods

نویسندگان

چکیده

We propose a method to optimally select mix network parameters for given deployment context and adversarial model. Our considers both worstcase average-case anonymity selects configurations that meet worst-case constraints while maximizing average anonymity. apply our methods mixnet size optimization determine the number width of layers, provide results various scenarios. For cases where suddenly changes (drop in user traffic) we evaluate countermeasures based on mix-generated dummy traffic show inexpensive link dummies can significantly boost protection some these cases.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Lattice Based Universal Re-encryption for Mixnet

Mixnet (Mix Network) was proposed by David Chaum [3] for anonymous communication in 1981. A mixnet is a multistage system that accepts encrypted messages under the public keys of all intermediate mixnet nodes and outputs randomly permuted corresponding plaintexts. In 2004, Golle et al [10] presented a new primitive called universal re-encryption based on the Elgamal public key cryptosystem. Uni...

متن کامل

Running Mixnet-Based Elections with Helios

The Helios voting system is an open-audit web-based voting system that has been used by various institutions in real-stake elections during the last few years. While targeting the simplicity of the election workflow, the homomorphic tallying process used in Helios limits its suitability for many elections (large number of candidates, specific ballot filling rules, . . . ). We present a variant ...

متن کامل

Universally Verifiable Efficient Re-encryption Mixnet

Implementing a transparent audit process when an election is conducted by electronic means is of paramount importance. Universally verifiable mixnets are focused on providing such a property by means of cryptographic proofs verifiable by any auditor. While some of these systems require high amount of computing resources that make them inefficient for real elections, others proposals reduce the ...

متن کامل

An Efficient Mixnet-based Voting Scheme

Receipt-freeness is an essential security property in electronic voting to prevent vote buying, selling or coercion. In this paper, we propose an efficient mixnet-based receipt-free voting scheme by modifying a voting scheme of Lee et al. The receipt-freeness property is obtained through the randomization service given by a trusted administrator, and assuming that two-way untappable channel is ...

متن کامل

Two Optimization Methods for Raytracing Two Optimization Methods for Raytracing

Raytracing is a method to produce photo-realistic pictures. For each pixel of an image one ray is shot to nd the object, which determines the color of the pixel. Rays are also used to simulate shadows and reeections. Previously bounding volume hierarchies have been used to speed raytracing. A new method to speed the traversal of a bounding volume hierarchy is presented. Optimisation methods to ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Proceedings on Privacy Enhancing Technologies

سال: 2022

ISSN: ['2299-0984']

DOI: https://doi.org/10.56553/popets-2022-0081