Auditable Privacy: On Tamper-Evident Mix Networks

نویسندگان

  • Jong Youl Choi
  • Philippe Golle
  • Markus Jakobsson
چکیده

We introduce the notion of tamper-evidence for mix networks in order to defend against attacks aimed at covertly leaking secret information held by corrupted mix servers. This is achieved by letting observers (which need not be trusted) verify the absence of covert channels by means of techniques we introduce herein. Our tamper-evident mix network is a type of re-encryption mixnet in which a server proves that the permutation and re-encryption factors that it uses are correctly derived from a random seed to which the server is committed.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptanalysis of A PAACP: A Portable Privacy- Preserving Authentication and Access Control Protocol in Vehicular Ad Hoc Networks

Vehicular ad hoc networks (VANETs) are emerging to improve road safety and traffic management. Privacy and security are very important in VANETs. Existing authentication protocols to secure VANETs raise challenges such as certificate distribution and reduction of the strong reliance on tamper-proof devices. Recently, Yeh et al. proposed a portable privacy-preserving authentication and access co...

متن کامل

Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking

We propose a new technique for making mix nets robust, called randomized partial checking (RPC). The basic idea is that rather than providing a proof of completely correct operation, each server provides strong evidence of its correct operation by revealing a pseudo-randomly selected subset of its input/output relations. Randomized partial checking is exceptionally efficient compared to previou...

متن کامل

Analyzing Tools and Algorithms for Privacy Protection and Data Security in Social Networks

The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...

متن کامل

Secure, pseudonymous, and auditable communication in vehicular ad hoc networks

Vehicular ad hoc networks (VANETs) represent a promising new communication technology that can facilitate many new forms of automotive applications. Many of the applications that will run on these networks will require a high degree of security and privacy. In this paper, we present a robust and efficient security framework for vehicular networks suited for both inter-vehicular and vehicle-to-i...

متن کامل

Tamper-Evident Complex Genomic Networks

Networks are important storage data structures now used to store personal information of individuals around the globe. With the advent of personal genome sequencing, networks are going to be used to store personal genomic sequencing of people. In contrast to social media networks, the importance of relationships in this genomic network is extremely significant. Losing connections between indivi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006