The dining cryptographers problem: Unconditional sender and recipient untraceability

From MaRDI portal
Revision as of 02:05, 31 January 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:1109008

DOI10.1007/BF00206326zbMath0654.94012WikidataQ56172630 ScholiaQ56172630MaRDI QIDQ1109008

David Chaum

Publication date: 1988

Published in: Journal of Cryptology (Search for Journal in Brave)





Related Items (only showing first 100 items - show all)

Quantifying leakage in the presence of unreliable sources of informationA practical anonymous payment scheme for electronic commerceSecret sets and applicationsUnconditionally secure quantum signaturesAutomatic verification of multi-agent systems by model checking via ordered binary decision diagramsTopology-hiding computation beyond semi-honest adversariesBest possible information-theoretic MPCRevisiting key-alternating Feistel ciphers for shorter keys and multi-user securityA space-efficient simulation algorithm on probabilistic automataAnonymous Communication and Anonymous CashProbabilistic and nondeterministic aspects of anonymityA computationally grounded, weighted doxastic logicUnnamed ItemPractical verification of multi-agent systems against \textsc{Slk} specificationsSymbolic Model Checking for Dynamic Epistemic LogicSecure Multi-party ShufflingPartial Order Reduction for Probabilistic Systems: A Revision for Distributed SchedulersAn efficient multi-receipt mechanism for uncoercible anonymous electronic votingThe cost of becoming anonymous: on the participant payload in crowdsAnonymous sealed bid auction protocol based on a variant of the dining cryptographers' protocolBlind one-time signature and its applicationsProbable innocence revisitedAbstraction for model checking multi-agent systemsModular verification of protocol equivalence in the presence of randomnessA better composition operator for quantitative information flow analysesSumming over a network without revealing summandsComparative analysis of related notions of opacity in centralized and coordinated architecturesParametric probabilistic transition systems for system design and analysisWeak bisimulation for probabilistic timed automataA cooperative quantum anonymous transmission with hybrid entanglement swappingA blind coupon mechanism enabling veto voting over unreliable networksBeating the Birthday Paradox in Dining Cryptographer NetworksHybrid statistical estimation of mutual information and its application to information flowCSP and anonymityUnconditional Byzantine agreement for any number of faulty processorsInformation-Theoretic Security Without an Honest MajorityOperational and Epistemic Approaches to Protocol Analysis: Bridging the GapTo know or not to know: Epistemic approaches to security protocol verificationSecurity invariants in discrete transition systemsDining Cryptographers with 0.924 Verifiable Collision ResolutionA faster cryptographer's Conspiracy SantaSpreading alerts quietly and the subgroup escape problemThe Secret Santa ProblemUnnamed ItemInformation theoretical cryptogenographyVerification and control of partially observable probabilistic systemsQuantum private communication with an anonymous senderCompositional noninterference from first principlesQuantum anonymous voting with anonymity checkA universally composable framework for the privacy of email ecosystemsUnnamed ItemTowards quantum-based privacy and votingThe meeting businessmen problem: requirements and limitationsProbabilistic opacity for Markov decision processesThe shadow knows: refinement and security in sequential programsDistributed probabilistic input/output automata: expressiveness, (un)decidability and algorithmsExact quantitative probabilistic model checking through rational searchHow to Brew-up a Refinement OrderingBeyond Knowing That: A New Generation of Epistemic LogicsImproved Bounded Model Checking for a Fair Branching-Time Temporal Epistemic LogicSymbolic Model Checking the Knowledge in Herbivore ProtocolVerification of initial-state opacity in security applications of discrete event systemsAnalyzing anonymity attacks through noisy channelsABSOLUTELY SECURE MESSAGE TRANSMISSION USING A KEY SHARING GRAPHOpacity for linear constraint Markov chainsConditional anonymity with non-probabilistic adversaryAn anonymous surveying protocol via Greenberger-Horne-Zeilinger statesAlgorithmic probabilistic game semantics. Playing games with automataAnonymity protocols as noisy channelsFormal Semantics of a Dynamic Epistemic Logic for Describing Knowledge Properties of π-Calculus ProcessesInformation hiding in probabilistic concurrent systemsProbabilistic anonymity via coalgebraic simulationsNew bounds for randomized busingUnnamed ItemMaking random choices invisible to the schedulerAbstractions of non-interference security: probabilistic versus possibilisticAutomatic verification of temporal-epistemic properties of cryptographic protocolsAn algebraic approach for reasoning about information flowA one-round secure message broadcasting protocol through a key sharing treeAnonymity Protocols as Noisy ChannelsA Framework for Automatically Checking Anonymity with μCRL\(k\)-anonymous data collectionBisimulation for Demonic SchedulersProvable unlinkability against traffic analysis with low message overheadWorst- and average-case privacy breaches in randomization mechanismsPositive announcementsThe Power of Anonymous Veto in Public DiscussionFormalization of Entropy Measures in HOLNon-interactive anonymous routerQuantitative Information Flow and Applications to Differential PrivacyBreaking Anonymity by Learning a Unique Minimum Hitting SetKnowledge and Action in Semi-public EnvironmentsNetwork-Hiding Communication and Applications to Multi-party ProtocolsSpreading the privacy blanket: differentially oblivious shuffling for differential privacyAn efficient protocol for anonymous multicast and reception.A new post-quantum voting protocol based on physical lawsWeak Probabilistic AnonymityPractical anonymous entanglement with noisy measurementSecurity analysis and improvement of the dining cryptographer problem-based anonymous quantum communication via non-maximally entanglement state analysisThe design of a secure and fair sealed-bid auction service




Cites Work




This page was built for publication: The dining cryptographers problem: Unconditional sender and recipient untraceability