메뉴 건너뛰기




Volumn 1976, Issue , 2000, Pages 178-191

A length-invariant hybrid mix

Author keywords

Anonymous channel; Hybrid encryption; Hybrid mix; Mix net

Indexed keywords

SECURITY OF DATA;

EID: 84937415944     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-44448-3_14     Document Type: Conference Paper
Times cited : (49)

References (25)
  • 1
    • 84956854310 scopus 로고    scopus 로고
    • Mix-networks on permutation networks
    • M. Abe. Mix-networks on permutation networks. Asiacrypt’99, LNCS 1716, pages 258–273. 1999.
    • (1999) Asiacrypt’99, LNCS , vol.1716 , pp. 258-273
    • Abe, M.1
  • 2
    • 84957069963 scopus 로고    scopus 로고
    • Robust distributed multiplication without interaction
    • M. Wiener, editor
    • M. Abe. Robust distributed multiplication without interaction. In M. Wiener, editor, in Cryptology—CRYPTO’99, LNCS 1666, pages 130–147. 1999.
    • (1999) Cryptology—CRYPTO’99, LNCS , vol.1666 , pp. 130-147
    • Abe, M.1
  • 3
    • 0034224836 scopus 로고    scopus 로고
    • Universally verifiable mix-net with verification work independent of the number of mix-servers
    • July, Presented in Eurocrypt’98
    • M. Abe. Universally verifiable mix-net with verification work independent of the number of mix-servers. IEICE Trans. Fundamentals, E83-A(7):1431–1440, July 2000. Presented in Eurocrypt’98.
    • (2000) IEICE Trans. Fundamentals , vol.E83-A , Issue.7 , pp. 1431-1440
    • Abe, M.1
  • 4
    • 84957629783 scopus 로고    scopus 로고
    • Relations among notions of security for public-key encryption schemes
    • M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway. Relations among notions of security for public-key encryption schemes. CRYPTO’98, LNCS 1462, pages 26–45. 1998.
    • (1998) CRYPTO’98, LNCS , vol.1462 , pp. 26-45
    • Bellare, M.1    Desai, A.2    Pointcheval, D.3    Rogaway, P.4
  • 5
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • M. Bellare and P. Rogaway. Random oracles are practical: a paradigm for designing efficient protocols. ACM CCCS, pages 62–73. 1993.
    • (1993) ACM CCCS , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 6
    • 84957712291 scopus 로고    scopus 로고
    • An efficient threshold public key cryptosystem secure against adaptive chosen ciphertext attack
    • R. Canetti and S. Goldwasser. An efficient threshold public key cryptosystem secure against adaptive chosen ciphertext attack. Eurocrypt’99, LNCS 1592, pages 90–106. 1999.
    • (1999) Eurocrypt’99, LNCS , vol.1592 , pp. 90-106
    • Canetti, R.1    Goldwasser, S.2
  • 7
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return address, and digital pseudonyms
    • D. L. Chaum. Untraceable electronic mail, return address, and digital pseudonyms. Comm. of the ACM, 24:84–88, 1981.
    • (1981) Comm. Of the ACM , vol.24 , pp. 84-88
    • Chaum, D.L.1
  • 8
    • 84870707379 scopus 로고    scopus 로고
    • A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
    • R. Cramer and V. Shoup. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. CRYPTO’98, LNCS 1462, pages 13–25. 1998.
    • (1998) CRYPTO’98, LNCS , vol.1462 , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 9
    • 84948958135 scopus 로고    scopus 로고
    • How to break a practical MIX and design a new one
    • Y. Desmedt and K. Kurosawa. How to break a practical MIX and design a new one. Eurocrypt 2000, LNCS 1807, pages 557–572. 2000.
    • (2000) Eurocrypt 2000, LNCS , vol.1807 , pp. 557-572
    • Desmedt, Y.1    Kurosawa, K.2
  • 10
    • 84955339164 scopus 로고    scopus 로고
    • Secure integration of asymmetric and symmetric encryption schemes. CRYPTO’99
    • E. Fujisaki and T. Okamoto. Secure integration of asymmetric and symmetric encryption schemes. CRYPTO’99, LNCS 1666, pages 537–554. 1999.
    • (1999) LNCS , vol.1666 , pp. 537-554
    • Fujisaki, E.1    Okamoto, T.2
  • 11
    • 84956868340 scopus 로고    scopus 로고
    • Decision oracles are equivalent to matching oracles
    • H. Handschuh, Y. Tsiounis, and M. Yung. Decision oracles are equivalent to matching oracles. PKC’99, LNCS 1560, pages 276–289. 1999.
    • (1999) PKC’99, LNCS , vol.1560 , pp. 276-289
    • Handschuh, H.1    Tsiounis, Y.2    Yung, M.3
  • 12
    • 84957709438 scopus 로고    scopus 로고
    • A practical mix
    • M. Jakobsson. A practical mix. Eurocrypt’98, LNCS 1403, pages 448–461. 1998.
    • (1998) Eurocrypt’98, LNCS , vol.1403 , pp. 448-461
    • Jakobsson, M.1
  • 14
    • 0005301131 scopus 로고    scopus 로고
    • Tech. Report 99-33, DIMACS, June
    • A. Juels and M. Jakobsson. Millimix. Tech. Report 99-33, DIMACS, June 1999.
    • (1999) Millimix
    • Juels, A.1    Jakobsson, M.2
  • 16
    • 84955592437 scopus 로고    scopus 로고
    • Some remarks on a receipt-free and universally verifiable mix-type voting scheme
    • M. Michels and P. Horster. Some remarks on a receipt-free and universally verifiable mix-type voting scheme. Asiacrypt’96, LNCS 1163, pages 125–132. 1996.
    • (1996) Asiacrypt’96, LNCS , vol.1163 , pp. 125-132
    • Michels, M.1    Horster, P.2
  • 18
    • 85027158725 scopus 로고
    • Efficient anonymous channel and all/nothing election scheme
    • C. Park, K. Itoh, and K. Kurosawa. Efficient anonymous channel and all/nothing election scheme. Eurocrypt’93, LNCS 765, pages 248–259. 1994.
    • (1994) Eurocrypt’93, LNCS , vol.765 , pp. 248-259
    • Park, C.1    Itoh, K.2    Kurosawa, K.3
  • 19
    • 84948967487 scopus 로고
    • Breaking an efficient anonymous channel
    • B. Pfitzmann. Breaking an efficient anonymous channel. Eurocrypt’94, LNCS 950, pages 339–348. 1995.
    • (1995) Eurocrypt’94, LNCS , vol.950 , pp. 339-348
    • Pfitzmann, B.1
  • 20
    • 85032859691 scopus 로고
    • How to break the direct RSA implementation of MIXes
    • B. Pfitzmann and A. Pfitzmann. How to break the direct RSA implementation of MIXes. Eurocrypt’89, LNCS 434, pages 373–381. 1989.
    • (1989) Eurocrypt’89, LNCS , vol.434 , pp. 373-381
    • Pfitzmann, B.1    Pfitzmann, A.2
  • 21
    • 84937489760 scopus 로고    scopus 로고
    • The efficient reductions between the decision Diffie-Hellman problem and related problems
    • July
    • T. Saitoh. The efficient reductions between the decision Diffie-Hellman problem and related problems. In the joint meeting of SCI2000 and ISAS2000, July 2000. available from the author.
    • (2000) In the Joint Meeting of SCI2000 and ISAS2000
    • Saitoh, T.1
  • 22
    • 84957356080 scopus 로고
    • Receipt-free mix-type voting scheme—a practical solution to the implementation of a voting booth—Eurocrypt’95
    • K. Sako and J. Kilian. Receipt-free mix-type voting scheme—a practical solution to the implementation of a voting booth—Eurocrypt’95, LNCS 921, pages 393–403. 1995.
    • (1995) LNCS , vol.921 , pp. 393-403
    • Sako, K.1    Kilian, J.2
  • 23
    • 84948976239 scopus 로고    scopus 로고
    • Using hash functions as a hedge against chosen ciphertext attack
    • V. Shoup. Using hash functions as a hedge against chosen ciphertext attack. Eurocrypt 2000, LNCS 1807, pages 275–288. 2000.
    • (2000) Eurocrypt 2000, LNCS , vol.1807 , pp. 275-288
    • Shoup, V.1
  • 24
    • 84888872516 scopus 로고    scopus 로고
    • Securing threshold cryptosystems against chosen ciphertext attack
    • V. Shoup and R. Gennaro. Securing threshold cryptosystems against chosen ciphertext attack. Eurocrypt’98, LNCS 1403, pages 1–16. 1998.
    • (1998) Eurocrypt’98, LNCS , vol.1403 , pp. 1-16
    • Shoup, V.1    Gennaro, R.2
  • 25
    • 84958979582 scopus 로고    scopus 로고
    • On the security of El Gamal based encryption
    • Y. Tsiounis and M. Yung. On the security of El Gamal based encryption. PKC’98, LNCS 1431, pages 117–134. 1998.
    • (1998) PKC’98, LNCS , vol.1431 , pp. 117-134
    • Tsiounis, Y.1    Yung, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.