How to break a practical MIX and design a new one
From MaRDI portal
Publication:3374937
Recommendations
Cited in
(26)- scientific article; zbMATH DE number 1583778 (Why is no real title available?)
- scientific article; zbMATH DE number 1618058 (Why is no real title available?)
- Auditable Privacy: On Tamper-Evident Mix Networks
- Selected Areas in Cryptography
- Topics in Cryptology – CT-RSA 2004
- Yet another compiler for active security or: efficient MPC over arbitrary rings
- An Adaptively Secure Mix-Net Without Erasures
- An optimally robust hybrid mix network
- Randomized partial checking revisited
- cMix: mixing with minimal real-time asymmetric cryptographic operations
- A verifiable secret shuffle of homomorphic encryptions
- scientific article; zbMATH DE number 2043308 (Why is no real title available?)
- Shared generation of pseudo-random functions
- A mix-net from any CCA2 secure cryptosystem
- Securing Abe's mix-net against malicious verifiers via witness indistinguishability
- scientific article; zbMATH DE number 1504554 (Why is no real title available?)
- Building Reliable Mix Networks with Fair Exchange
- The reactive simulatability (RSIM) framework for asynchronous systems
- Theory of Cryptography
- Towards a theory of intrusion detection
- A Commitment-Consistent Proof of a Shuffle
- Optimistic Mixing for Exit-Polls
- Verifiable shuffles: a formal model and a Paillier-based three-round construction with provable security
- Distributed Verification of Mixing - Local Forking Proofs Model
- Public Key Cryptography – PKC 2004
- Electronic jury voting protocols
This page was built for publication: How to break a practical MIX and design a new one
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3374937)