메뉴 건너뛰기




Volumn 94, Issue 12, 2006, Pages 2142-2180

A survey on mix networks and their secure applications

Author keywords

Anonymity; Applied cryptography; Mixnets; Privacy; Protocols

Indexed keywords

CRYPTOGRAPHY; NETWORK PROTOCOLS; NETWORK SECURITY; ROBUSTNESS (CONTROL SYSTEMS);

EID: 33947418087     PISSN: 00189219     EISSN: None     Source Type: Journal    
DOI: 10.1109/JPROC.2006.889687     Document Type: Review
Times cited : (46)

References (107)
  • 1
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • D. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms," Commun. ACM, vol. 24, no. 2, pp. 84-88, 1981.
    • (1981) Commun. ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 2
    • 85084162002 scopus 로고    scopus 로고
    • Making mix nets robust for electronic voting by randomized partial checking
    • New York: Springer-Verlag
    • M. Jakobsson, A. Juels, and R. Rivest, "Making mix nets robust for electronic voting by randomized partial checking," in Proc. USENIX' 02. New York: Springer-Verlag, 2002, pp. 339-353.
    • (2002) Proc. USENIX' 02 , pp. 339-353
    • Jakobsson, M.1    Juels, A.2    Rivest, R.3
  • 14
    • 84890935025 scopus 로고    scopus 로고
    • Online, Available
    • Onion routing. [Online]. Available: http://www.onion-router.net/
    • Onion routing
  • 16
    • 84955605258 scopus 로고    scopus 로고
    • MIXes in mobile communication systems: Location management with privacy
    • H. Federrath, A. Jerichow, and A. Pfitzmann, "MIXes in mobile communication systems: Location management with privacy," in Proc. Information Hiding. 1996, pp. 121-135.
    • (1996) Proc. Information Hiding , pp. 121-135
    • Federrath, H.1    Jerichow, A.2    Pfitzmann, A.3
  • 21
    • 33947399380 scopus 로고    scopus 로고
    • Online, Available
    • Free haven project bibliography. [Online]. Available: http://www.freehaven.net/anonbib/date.html
    • Free haven project bibliography
  • 22
    • 84937549115 scopus 로고    scopus 로고
    • The disadvantages of free mix routes and how to overcome them
    • O. Berthold, A. Pfitzmann, and R. Standtke, "The disadvantages of free mix routes and how to overcome them," in Proc. Anonymity, 2001, pp. 30-45.
    • (2001) Proc. Anonymity , pp. 30-45
    • Berthold, O.1    Pfitzmann, A.2    Standtke, R.3
  • 30
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public key cryptosystems," Commun. ACM, vol. 21, pp. 120-126, 1978.
    • (1978) Commun. ACM , vol.21 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 31
    • 35248844472 scopus 로고    scopus 로고
    • Provably secure public-key encryption for length-preserving Chaumian mixes
    • New York: Springer-Verlag
    • B. Möller, "Provably secure public-key encryption for length-preserving Chaumian mixes," in Proc. CT-RSA. New York: Springer-Verlag, 2003, pp. 244-262.
    • (2003) Proc. CT-RSA , pp. 244-262
    • Möller, B.1
  • 32
    • 0024611659 scopus 로고
    • The knowledge complexity of interactive proof systems
    • S. Goldwasser, S. Micali, and C. Rackoff, "The knowledge complexity of interactive proof systems," SIAM J. Computing, vol. 18, pp. 186-208, 1989.
    • (1989) SIAM J. Computing , vol.18 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 33
    • 85027158725 scopus 로고
    • Efficient anonymous channel and all/nothing election scheme
    • New York: Springer-Verlag
    • C. Park, K. Itoh, and K. Kurosawa, "Efficient anonymous channel and all/nothing election scheme," in Advances in Cryptology-Eurocrypt. New York: Springer-Verlag, 1994, pp. 248-259.
    • (1994) Advances in Cryptology-Eurocrypt , pp. 248-259
    • Park, C.1    Itoh, K.2    Kurosawa, K.3
  • 34
    • 84874800178 scopus 로고
    • A public-key cryptosystem and a signature scheme based on discrete logarithms
    • Jul
    • T. Elgamal, "A public-key cryptosystem and a signature scheme based on discrete logarithms," IEEE Trans. Inform. Theory, vol. 31, no. 4, pp. 469-472, Jul. 1985.
    • (1985) IEEE Trans. Inform. Theory , vol.31 , Issue.4 , pp. 469-472
    • Elgamal, T.1
  • 35
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, "How to share a secret," Commun. ACM, vol. 22, no. 11, pp. 612-613, 1979.
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 37
    • 84956869808 scopus 로고    scopus 로고
    • On quorum controlled asymmetric proxy re-encryption
    • M. Jakobsson, "On quorum controlled asymmetric proxy re-encryption," in Proc. PKC, 1999, pp. 112-121.
    • (1999) Proc. PKC , pp. 112-121
    • Jakobsson, M.1
  • 40
    • 84957356080 scopus 로고
    • Receipt-free mix-type voting scheme - A practical solution to the implementation of a voting booth
    • K. Sako and J. Killian, "Receipt-free mix-type voting scheme - A practical solution to the implementation of a voting booth," in Advances Cryptology-Eurocrypt, 1995, pp. 393-403.
    • (1995) Advances Cryptology-Eurocrypt , pp. 393-403
    • Sako, K.1    Killian, J.2
  • 41
    • 85032859691 scopus 로고
    • How to break the direct rsa-implementation of mixes
    • B. Pfitzmann and A. Pfitzmann, "How to break the direct rsa-implementation of mixes," in Advances Cryptology-Eurocrypt, 1989, pp. 373-381.
    • (1989) Advances Cryptology-Eurocrypt , pp. 373-381
    • Pfitzmann, B.1    Pfitzmann, A.2
  • 42
    • 84948967487 scopus 로고
    • Breaking an efficient anonymous channel
    • B. Pfitzmann, "Breaking an efficient anonymous channel," in Advances CrypJology-Eurocrypt, 1994, pp. 332-340.
    • (1994) Advances CrypJology-Eurocrypt , pp. 332-340
    • Pfitzmann, B.1
  • 45
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make big brother obsolete
    • D. Chaum, "Security without identification: Transaction systems to make big brother obsolete," Commun. ACM, vol. 28, no. 10, pp. 1030-1044, 1985.
    • (1985) Commun. ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 47
    • 84948958135 scopus 로고    scopus 로고
    • How to break a practical mix and design a new one
    • Y. Desmedt and K. Kurosawa, "How to break a practical mix and design a new one," in Advances Cryptology-Eurocrypt, 2000, pp. 557-572.
    • (2000) Advances Cryptology-Eurocrypt , pp. 557-572
    • Desmedt, Y.1    Kurosawa, K.2
  • 50
    • 63449118333 scopus 로고    scopus 로고
    • Flaws in some robust optimistic mixnets
    • M. Abe and H. Imai, "Flaws in some robust optimistic mixnets," in Proc. ACISP, 2003, pp. 39-50.
    • (2003) Proc. ACISP , pp. 39-50
    • Abe, M.1    Imai, H.2
  • 51
    • 84955592437 scopus 로고    scopus 로고
    • Some remarks on a receipt-free and universally verifiable mix-type voting scheme
    • M. Michels and P. Horster, "Some remarks on a receipt-free and universally verifiable mix-type voting scheme," in Advances Cryptology-Asiacrypt, 1996, pp. 125-132.
    • (1996) Advances Cryptology-Asiacrypt , pp. 125-132
    • Michels, M.1    Horster, P.2
  • 52
    • 84957715741 scopus 로고    scopus 로고
    • Universally verifiable mix-net with verification work independent of the number of mix-centers
    • M. Abe, "Universally verifiable mix-net with verification work independent of the number of mix-centers," in Advances Cryptology-Eurocrypt, 1998, pp. 437-447.
    • (1998) Advances Cryptology-Eurocrypt , pp. 437-447
    • Abe, M.1
  • 53
    • 84956854310 scopus 로고    scopus 로고
    • Mix-networks on permutation networks
    • _, "Mix-networks on permutation networks," in Advances Cryptology-Asiacrypt, 1999, pp. 258-273.
    • (1999) Advances Cryptology-Asiacrypt , pp. 258-273
    • Abe, M.1
  • 55
    • 84937409147 scopus 로고    scopus 로고
    • Remarks on mix-networks based on permutation networks
    • M. Abe and F. Hoshino, "Remarks on mix-networks based on permutation networks," in Proc. PKC, 2001, pp. 317-324.
    • (2001) Proc. PKC , pp. 317-324
    • Abe, M.1    Hoshino, F.2
  • 56
    • 0000648555 scopus 로고
    • A permutation network
    • A. Waksman, "A permutation network," J. ACM, vol. 15, no. 1, pp. 159-163, 1968.
    • (1968) J. ACM , vol.15 , Issue.1 , pp. 159-163
    • Waksman, A.1
  • 60
    • 84880857711 scopus 로고    scopus 로고
    • An efficient scheme for proving a shuffle
    • J. Furukawa and K. Sako, "An efficient scheme for proving a shuffle," in Advances Cryptology-Crypto, 2001, pp. 368-387.
    • (2001) Advances Cryptology-Crypto , pp. 368-387
    • Furukawa, J.1    Sako, K.2
  • 61
    • 24944556554 scopus 로고    scopus 로고
    • A verifiable secret shuffle of homomorphic encryptions
    • J. Groth, "A verifiable secret shuffle of homomorphic encryptions," in Proc. PKC, 2003, pp. 145-160.
    • (2003) Proc. PKC , pp. 145-160
    • Groth, J.1
  • 66
    • 33947432527 scopus 로고    scopus 로고
    • Online, Available
    • Alixminion. [Online]. Available: http://mixminion.net/
    • Alixminion
  • 75
  • 79
    • 85022187530 scopus 로고
    • Shared generation of authenticators and signatures
    • Y. Desmedt and Y. Frankel, "Shared generation of authenticators and signatures," in Advances Cryptology-Crypto, 1992, pp. 457-469.
    • (1992) Advances Cryptology-Crypto , pp. 457-469
    • Desmedt, Y.1    Frankel, Y.2
  • 80
    • 84948954277 scopus 로고    scopus 로고
    • Practical threshold signatures
    • V. Shoup, "Practical threshold signatures," in Advances Cryptology-Eurocrypt, 2000, pp. 207-220.
    • (2000) Advances Cryptology-Eurocrypt , pp. 207-220
    • Shoup, V.1
  • 81
    • 0023861309 scopus 로고
    • The dining cryptographers problem: Unconditional sender and recipient untraceability
    • D. Chaum, "The dining cryptographers problem: Unconditional sender and recipient untraceability," J. Cryptology, vol. 1, no. 1, pp. 65-75, 1988.
    • (1988) J. Cryptology , vol.1 , Issue.1 , pp. 65-75
    • Chaum, D.1
  • 84
    • 0038041177 scopus 로고    scopus 로고
    • Introducing Morphmix: Peer-to-peer based anonymous internet usage with collusion detection
    • M. Rennhard and B. Plattner, "Introducing Morphmix: Peer-to-peer based anonymous internet usage with collusion detection," in Proc. Workshop Privacy Electronic Soc., 2002, pp. 91-102.
    • (2002) Proc. Workshop Privacy Electronic Soc , pp. 91-102
    • Rennhard, M.1    Plattner, B.2
  • 85
  • 92
    • 0000135789 scopus 로고
    • A threshold cryptosystem without a trusted party
    • 227 526
    • T. Pedersen, "A threshold cryptosystem without a trusted party," in Advances Cryptology-Eurocrypt, 1991, p. 5 227 526.
    • (1991) Advances Cryptology-Eurocrypt , pp. 5
    • Pedersen, T.1
  • 93
  • 94
    • 84957080948 scopus 로고    scopus 로고
    • A simple publicly verifiable secret sharing scheme and its applications to electronic voting
    • B. Schoenmakers, "A simple publicly verifiable secret sharing scheme and its applications to electronic voting," in Advances Cryptology-Crypto, 1999, pp. 148-164.
    • (1999) Advances Cryptology-Crypto , pp. 148-164
    • Schoenmakers, B.1
  • 96
    • 85032188633 scopus 로고
    • Society and group oriented cryptography: A new concept
    • Y. Desmedt, "Society and group oriented cryptography: A new concept," in Advances Cryptology-Crypto, 1987, pp. 120-127.
    • (1987) Advances Cryptology-Crypto , pp. 120-127
    • Desmedt, Y.1
  • 97
    • 0022914590 scopus 로고
    • Proofs that yield nothing but the validity of the assertion, and a methodology of cryptographic protocol design
    • O. Goldreich, S. Micali, and A. Wigderson, "Proofs that yield nothing but the validity of the assertion, and a methodology of cryptographic protocol design," in Proc. 27th IEEE Symp. Found. Computer Sci., 1986, pp. 174-187.
    • (1986) Proc. 27th IEEE Symp. Found. Computer Sci , pp. 174-187
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 98
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • A. Fiat and A. Shamir, "How to prove yourself: Practical solutions to identification and signature problems," in Advances Cryptology-Crypto, 1987, pp. 186-194.
    • (1987) Advances Cryptology-Crypto , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 100
    • 33947422211 scopus 로고    scopus 로고
    • FIPS 180-1, Secure Hash Standard, Apr. 1995: U.S. Dept. Commerce/N.I.S.T., Nat. Tech. Information Service, Springfield, VA.
    • "FIPS 180-1, Secure Hash Standard," Apr. 1995: U.S. Dept. Commerce/N.I.S.T., Nat. Tech. Information Service, Springfield, VA.
  • 104
    • 84896508047 scopus 로고
    • Unconditional sender and recipient untraceability in spite of active attacks
    • M. Waidner, "Unconditional sender and recipient untraceability in spite of active attacks," in Advances Cryptology - Eurocrypt, vol. 434, 1990, pp. 302-319.
    • (1990) Advances Cryptology - Eurocrypt , vol.434 , pp. 302-319
    • Waidner, M.1
  • 106
    • 33947394540 scopus 로고    scopus 로고
    • Breaking four mix-related schemes based on universal re-encryption
    • Sep
    • G. Danezis, "Breaking four mix-related schemes based on universal re-encryption," in Proc. Information Security Conf., Sep. 2006.
    • (2006) Proc. Information Security Conf
    • Danezis, G.1
  • 107
    • 33947365689 scopus 로고    scopus 로고
    • Anonymity and privacy in electronic services,
    • Ph.D. dissertation, Katholieke Universiteit Leuven, Leuven, Belgium, Dec
    • C. Díaz, "Anonymity and privacy in electronic services," Ph.D. dissertation, Katholieke Universiteit Leuven, Leuven, Belgium, Dec. 2005.
    • (2005)
    • Díaz, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.