Abstract—Shuffling is an effective method to build a publicly verifiable mix network to implement verifiable anonymous channels that can be used for important cryptographic applications like electronic voting and electronic cash. One shuffling scheme by Groth is claimed to be secure and efficient. However, its soundness has not been formally proven. An attack against the soundness of this shuffling scheme is presented in this paper. Such an attack compromises the soundness of the mix network based on it. Two new shuffling protocols are designed on the basis of Groth's shuffling and batch verification techniques. The first new protocol is not completely sound, but is formally analyzed in regards to soundness, so it can be applied to bui...
We study the question of how to shuffle n cards when faced with an opponent who knows the initial po...
We suggest an honest verifier zero-knowledge argument for the correctness of a shuffle of homomorphi...
International audienceAnonymity is a primary ingredient for our digital life. Several tools have bee...
In this thesis we consider different mix network protocols. First, we discuss a protocol called cMix...
A mix network by Wikstrom fails in correctness, provable privacy and soundness. Its claimed advantag...
© 2012 Kim RamchenCryptographic mixnets are a fundamental tool in the construction of secure electro...
Abstract. We show how to obfuscate a secret shuffle of ciphertexts: shuffling becomes a public opera...
In electronic voting or whistle blowing, anonymity is necessary. Shuffling is a network security tec...
IoT devices have very strong requirements on all the resources such as memory, randomness, energy an...
Together with masking, shuffling is one of the most frequently considered solutions to improve the s...
2020, Springer Nature Switzerland AG. In this paper, we propose a new commitment key generation meth...
We show how to public-key obfuscate two commonly used shuffles: decryption shuffles which permute an...
Abstract. Together with masking, shuffling is one of the most fre-quently considered solutions to im...
Since David Chaum introduced the idea of mix nets 40 years ago, they have become widely used buildin...
Mixnets are one of the main approaches to deploy secret and verifiable electronic elections. General...
We study the question of how to shuffle n cards when faced with an opponent who knows the initial po...
We suggest an honest verifier zero-knowledge argument for the correctness of a shuffle of homomorphi...
International audienceAnonymity is a primary ingredient for our digital life. Several tools have bee...
In this thesis we consider different mix network protocols. First, we discuss a protocol called cMix...
A mix network by Wikstrom fails in correctness, provable privacy and soundness. Its claimed advantag...
© 2012 Kim RamchenCryptographic mixnets are a fundamental tool in the construction of secure electro...
Abstract. We show how to obfuscate a secret shuffle of ciphertexts: shuffling becomes a public opera...
In electronic voting or whistle blowing, anonymity is necessary. Shuffling is a network security tec...
IoT devices have very strong requirements on all the resources such as memory, randomness, energy an...
Together with masking, shuffling is one of the most frequently considered solutions to improve the s...
2020, Springer Nature Switzerland AG. In this paper, we propose a new commitment key generation meth...
We show how to public-key obfuscate two commonly used shuffles: decryption shuffles which permute an...
Abstract. Together with masking, shuffling is one of the most fre-quently considered solutions to im...
Since David Chaum introduced the idea of mix nets 40 years ago, they have become widely used buildin...
Mixnets are one of the main approaches to deploy secret and verifiable electronic elections. General...
We study the question of how to shuffle n cards when faced with an opponent who knows the initial po...
We suggest an honest verifier zero-knowledge argument for the correctness of a shuffle of homomorphi...
International audienceAnonymity is a primary ingredient for our digital life. Several tools have bee...