Anonymous Channel: a bucketized approach

نویسنده

  • Mathilde DUCLOS
چکیده

1 Background 2 1.1 Characterization of Anonymous Channel Based on Indistinguishability . . . . . . . . . . . . 2 1.1.1 Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.1.2 Relations Proven . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.2 A Provably Secure And Efficient Countermeasure Against Timing Attacks . . . . . . . . . . 6

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Breaking an Efficient Anonymous Channel

At Eurocrypt 1993, Park, Itoh, and Kurosawa presented an “all/nothing election scheme and anonymous channel”. The schemes are based on the mix-net and the election scheme constructed from this anonymous channel (Chaum 1981). One of the two main improvements is that the messages sent by normal participants are significantly shorter in the two new anonymous channels. However, we show several succ...

متن کامل

A new approach for achieving excellent strain homogeneity in tubular channel angular pressing (TCAP) process

Tubular channel angular pressing (TCAP) is a recently invented novel severe plastic deformation technique for producing UFG tubes. Plastic deformation analysis using the finite element method (FEM) was carried out to investigate the effects of trapezoidal channel geometry on strain inhomogeneity index (SII), strain level and required load compared to previously used channel geometries. The resu...

متن کامل

Anonymous channel and authentication in wireless communications

In this paper, we propose a scheme for providing anonymous channel service in wireless communications. By this service, many interesting applications, such as electronic elections, anonymous group discussions, with user identification confidential can be easily realized. No one can trace a sender’s identification and no one but the authority centre can distinguish an anonymous message from a no...

متن کامل

مقایسه نیمرخ شخصیتی معتادان گمنام و غیر گمنام زندانی مرد

Aim: This study compared the personality profiles of inmate anonymous and non-anonymous male addicts. Method: The participants of study were anonymous and non-anonymous male addicts of the prisons of the Hamadan province in 1391. The population was 3130 addicts, including 627 anonymous and 2503 non-anonymous addicts. The 310 addicts were selected by stratified random sampling the sample size wa...

متن کامل

Anonymity-Preserving Public-Key Encryption: A Constructive Approach

A receiver-anonymous channel allows a sender to send a message to a receiver without an adversary learning for whom the message is intended. Wireless broadcast channels naturally provide receiver anonymity, as does multi-casting one message to a receiver population containing the intended receiver. While anonymity and confidentiality appear to be orthogonal properties, making anonymous communic...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010