메뉴 건너뛰기




Volumn 4107 LNCS, Issue , 2006, Pages 126-141

Auditable privacy: On tamper-evident mix networks

Author keywords

Covert channel; Malware; Mix network; Observer; Subliminal channel; Tamper evident

Indexed keywords

COMPUTER CRIME; COMPUTER NETWORKS; INFORMATION RETRIEVAL; SECURITY OF DATA; SERVERS;

EID: 33750067964     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11889663_9     Document Type: Conference Paper
Times cited : (4)

References (32)
  • 1
    • 84956854310 scopus 로고    scopus 로고
    • Mix-networks on permutation networks
    • LNCS 1716, Springer-Verlag
    • M. Abe. Mix-networks on permutation networks, In ASIACRYPT '99, LNCS 1716, Springer-Verlag, 1999. pp. 258-273.
    • (1999) ASIACRYPT '99 , pp. 258-273
    • Abe, M.1
  • 2
    • 2342617507 scopus 로고    scopus 로고
    • Secret ballot receipts: True voter-verifiable elections
    • D. Chaum. Secret Ballot Receipts: True Voter-Verifiable Elections. RSA CryptoBytes, Volume 7, No. 2, 2004.
    • (2004) RSA CryptoBytes , vol.7 , Issue.2
    • Chaum, D.1
  • 3
    • 84941156373 scopus 로고    scopus 로고
    • Tamper-evident digital signatures: Protecting certification authorities against malware
    • J. Choi, P. Golle, and M. Jakobsson. Tamper-Evident Digital Signatures: Protecting Certification Authorities Against Malware. IACR ePrint report, No. 147, 2005.
    • (2005) IACR EPrint Report , Issue.147
    • Choi, J.1    Golle, P.2    Jakobsson, M.3
  • 4
    • 85034660220 scopus 로고
    • Subliminal-free authentication and signature
    • LNCS 330. Springer-Verlag
    • Y. Desmedt. Subliminal-free authentication and signature. In Advances in Cryptology - Eurocrypt '88, LNCS 330. Springer-Verlag, 1988. pp. 23-33.
    • (1988) Advances in Cryptology - Eurocrypt '88 , pp. 23-33
    • Desmedt, Y.1
  • 5
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solution to identification and signature problems
    • LNCS 26. Springer-Verlag
    • A. Fiat and A. Shamir. How to prove yourself: Practical Solution to Identification and Signature Problems. In Advances in Cryptology - Crypto'86, LNCS 26. Springer-Verlag, 1987. pp. 186-194.
    • (1987) Advances in Cryptology - Crypto'86 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 7
    • 49049089688 scopus 로고    scopus 로고
    • Secure distributed key generation for discrete-log based cryptosystems
    • LNCS 1592, Springer-Verlag
    • R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. In Proc. of Eurocrypt '99, LNCS 1592, Springer-Verlag, 1999. pp. 295-310.
    • (1999) Proc. of Eurocrypt '99 , pp. 295-310
    • Gennaro, R.1    Jarecki, S.2    Krawczyk, H.3    Rabin, T.4
  • 8
    • 84957709438 scopus 로고    scopus 로고
    • A practical mix
    • LNCS 1403, Springer-Verlag
    • M. Jakobsson. A practical mix. In Proc. of Eurocrypt '98, LNCS 1403, Springer-Verlag, 1998. pp. 448-461.
    • (1998) Proc. of Eurocrypt '98 , pp. 448-461
    • Jakobsson, M.1
  • 9
    • 84958981017 scopus 로고    scopus 로고
    • RSA key generation with verifiable randomness
    • LNCS 2274, Springer-Verlag
    • A. Juels and J. Guajardo. RSA Key Generation with Verifiable Randomness. In Public Key Cryptography 2002, LNCS 2274, Springer-Verlag, 2002. pp. 357-374.
    • (2002) Public Key Cryptography 2002 , pp. 357-374
    • Juels, A.1    Guajardo, J.2
  • 10
    • 85084162002 scopus 로고    scopus 로고
    • Making mix nets robust for electronic voting by randomized partial checking
    • M. Jakobsson, A. Juels, and R, Rivest. Making mix nets robust for electronic voting by randomized partial checking. In Proc. of USENIX'02, pp. 339-353.
    • Proc. of USENIX'02 , pp. 339-353
    • Jakobsson, M.1    Juels, A.2    Rivest, R.3
  • 12
    • 84957357388 scopus 로고    scopus 로고
    • Distributed "magic ink" signatures
    • LNCS 1233, Springer-Verlag
    • M. Jakobsson and M. Yung. Distributed "Magic Ink" Signatures. In Advances in Cryptology - Eurocrypt '97, LNCS 1233, Springer-Verlag, 1997. pp. 450-464.
    • (1997) Advances in Cryptology - Eurocrypt '97 , pp. 450-464
    • Jakobsson, M.1    Yung, M.2
  • 13
    • 85077591735 scopus 로고    scopus 로고
    • Cryptographic voting protocols: A systems perspective
    • August
    • C. Karlof, N. Sastry, and D. Wagner, Cryptographic Voting Protocols: A Systems Perspective. In USENIX Security '05, August 2005. pp. 33-50.
    • (2005) USENIX Security '05 , pp. 33-50
    • Karlof, C.1    Sastry, N.2    Wagner, D.3
  • 16
    • 84955592437 scopus 로고    scopus 로고
    • Some remarks on a receipt-free and universally verifiable mix-type voting scheme
    • K. Kim and T. Matsumoto, editors, LNCS 1163, Springer-Verlag
    • M. Michels and P. Horster. Some remarks on a receipt-free and universally verifiable mix-type voting scheme. In K. Kim and T. Matsumoto, editors, ASIACRYPT '96, LNCS 1163, Springer-Verlag, 1996.
    • (1996) ASIACRYPT '96
    • Michels, M.1    Horster, P.2
  • 17
    • 0035754862 scopus 로고    scopus 로고
    • A verifiable secret shuffle and its application to e-voting
    • ACM Press
    • C. A. Neff. A verifiable secret shuffle and its application to e-voting. In Proc. of CCS '01. ACM Press, 2001. pp. 116-125
    • (2001) Proc. of CCS '01 , pp. 116-125
    • Neff, C.A.1
  • 18
    • 0002986502 scopus 로고    scopus 로고
    • Fault tolerant anonymous channel
    • LNCS 1334, Springer-Verlag
    • W. Ogata, K. Kurosawa, K. Sako, and K. Takatani. Fault tolerant anonymous channel. In Proc. of ICICS '97, LNCS 1334, Springer-Verlag, 1997. pp. 440-444.
    • (1997) Proc. of ICICS '97 , pp. 440-444
    • Ogata, W.1    Kurosawa, K.2    Sako, K.3    Takatani, K.4
  • 20
    • 84927727752 scopus 로고    scopus 로고
    • Security proofs for signature schemes
    • LNCS 1070. Springer-Verlag
    • D. Pointcheval and J. Stern. Security proofs for signature schemes. In Advances in Cryptology - Eurocrypt '96, LNCS 1070. Springer-Verlag, 1996. pp. 387-398.
    • (1996) Advances in Cryptology - Eurocrypt '96 , pp. 387-398
    • Pointcheval, D.1    Stern, J.2
  • 21
    • 33750079066 scopus 로고    scopus 로고
    • Electronic voting systems - Is Brazil ahead of its time?
    • Pedro A.D. Rezende. Electronic Voting Systems - Is Brazil Ahead of its Time?. RSA CryptoBytes, Volume 7, No. 2, 2004.
    • (2004) RSA CryptoBytes , vol.7 , Issue.2
    • Rezende, P.A.D.1
  • 23
    • 0000537828 scopus 로고
    • Efficient signature generation for smart cards
    • C. P. Schnorr. Efficient Signature Generation for Smart Cards. In Proc. of Crypto '89, 1989. pp. 239-252.
    • (1989) Proc. of Crypto '89 , pp. 239-252
    • Schnorr, C.P.1
  • 24
    • 0001217738 scopus 로고
    • The prisoners' problem and the subliminal channel
    • G. J. Simmons. The prisoners' problem and the subliminal channel. In Proc. of Crypto '83, 1983. pp. 51-67.
    • (1983) Proc. of Crypto '83 , pp. 51-67
    • Simmons, G.J.1
  • 25
    • 84985824882 scopus 로고    scopus 로고
    • The subliminal channel and digital signature
    • LNCS 209, Springer-Verlag
    • G. J. Simmons. The subliminal channel and digital signature. In Proc. of Eurocrypt '84, LNCS 209, Springer-Verlag, 1996. pp. 364-378.
    • (1996) Proc. of Eurocrypt '84 , pp. 364-378
    • Simmons, G.J.1
  • 26
    • 85028916857 scopus 로고
    • Response to comments on the NIST proposed Digital Signature Standard
    • LNCS 740. Springer-Verlag
    • M. E. Smid and D. K. Branstad. Response to comments on the NIST proposed Digital Signature Standard. In Proc. of Crypto '92, LNCS 740. Springer-Verlag, 1992. pp. 76-87.
    • (1992) Proc. of Crypto '92 , pp. 76-87
    • Smid, M.E.1    Branstad, D.K.2
  • 27
    • 84947917119 scopus 로고    scopus 로고
    • Publicly verifiable secret sharing
    • LNCS 1070, Springer-Verlag
    • M. Stadler, Publicly Verifiable Secret Sharing, In Advances in Cryptology - Eurocrypt '96, LNCS 1070, Springer-Verlag, 1996. pp. 190-199.
    • (1996) Advances in Cryptology - Eurocrypt '96 , pp. 190-199
    • Stadler, M.1
  • 28
    • 84955586344 scopus 로고    scopus 로고
    • The dark side of "black-box" cryptography, or: Should we trust capstone?
    • A. Young and M. Yung. The Dark Side of "Black-Box" Cryptography, or: Should We Trust Capstone? In Proc. of Crypto 1996, 1996. pp. 89-103.
    • (1996) Proc. of Crypto 1996 , pp. 89-103
    • Young, A.1    Yung, M.2
  • 29
    • 84958645678 scopus 로고    scopus 로고
    • The prevalence of Kleptographic attacks on discrete-log based cryptosystems
    • A. Young and M. Yung. The prevalence of Kleptographic attacks on discrete-log based cryptosystems. In Proc. of Crypto '97, 1997. pp. 264-276.
    • (1997) Proc. of Crypto '97 , pp. 264-276
    • Young, A.1    Yung, M.2
  • 30
    • 84957360674 scopus 로고    scopus 로고
    • Kleptography: Using cryptography against cryptography
    • LNCS 1233, Springer-Verlag
    • A. Young and M. Yung. Kleptography: using cryptography against cryptography. In Proc. of Eurocrypt '97, LNCS 1233, Springer-Verlag, 1997. pp. 62-74.
    • (1997) Proc. of Eurocrypt '97 , pp. 62-74
    • Young, A.1    Yung, M.2
  • 31
    • 84937463317 scopus 로고    scopus 로고
    • Auto-recoverable and auto-certifiable cryptosystems
    • LNCS 1403, Springer-Verlag
    • A. Young and M. Yung. Auto-Recoverable and Auto-Certifiable Cryptosystems. In Advances in Cryptology - Eurocrypt '98, LNCS 1403, Springer-Verlag, 1998. pp. 119-133.
    • (1998) Advances in Cryptology - Eurocrypt '98 , pp. 119-133
    • Young, A.1    Yung, M.2
  • 32
    • 84958979582 scopus 로고    scopus 로고
    • On the security of ElGamal based encryption
    • LNCS 1431, Springer-Verlag, Feb.
    • Y. Tsiounis and M. Yung. On the Security of ElGamal Based Encryption. In Proc. of PKC '98, LNCS 1431, Springer-Verlag, Feb. 1998. pp. 117-134
    • (1998) Proc. of PKC '98 , pp. 117-134
    • Tsiounis, Y.1    Yung, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.