We study the question of how to shuffle n cards when faced with an opponent who knows the initial position of all the cards and can track every card when permuted, except when one takes K < n cards at a time and shuffles them in a private buffer “behind your back, ” which we call buffer shuffling. The prob-lem arises naturally in the context of parallel mixnet servers as well as other security applications. Our analysis is based on related analyses of load-balancing processes. We include extensions to variations that involve corrupted servers and adversarially injected messages, which correspond to an opponent who can peek at some shuffles in the buffer and who can mark some number of the cards. In addition, our analysis makes novel use ...
Together with masking, shuffling is one of the most frequently considered solutions to improve the s...
Abstract. Together with masking, shuffling is one of the most fre-quently considered solutions to im...
Abstract. In secure multi-party shuffling, multiple parties, each holding an input, want to agree on...
In electronic voting or whistle blowing, anonymity is necessary. Shuffling is a network security tec...
Abstract. We show how to obfuscate a secret shuffle of ciphertexts: shuffling becomes a public opera...
We consider oblivious two-party protocols where a client outsources N blocks of private data to a se...
We study a protocol for distributed computation called shuffled check-in, which achieves strong priv...
Abstract—Shuffling is an effective method to build a publicly verifiable mix network to implement ve...
In this thesis we consider different mix network protocols. First, we discuss a protocol called cMix...
Card-based protocols allow to evaluate an arbitrary fixed Boolean function f on a hidden input to ob...
IoT devices have very strong requirements on all the resources such as memory, randomness, energy an...
The MIX technique forms the basis of many popular services that offer anonymity of communication in ...
We consider the problem of designing scalable, robust protocols for computing statistics about sensi...
Pre-printsInternational audienceWe revisit the popular adage that side-channel countermeasures must ...
We consider oblivious two-party protocols where a client outsources N blocks of private data to a se...
Together with masking, shuffling is one of the most frequently considered solutions to improve the s...
Abstract. Together with masking, shuffling is one of the most fre-quently considered solutions to im...
Abstract. In secure multi-party shuffling, multiple parties, each holding an input, want to agree on...
In electronic voting or whistle blowing, anonymity is necessary. Shuffling is a network security tec...
Abstract. We show how to obfuscate a secret shuffle of ciphertexts: shuffling becomes a public opera...
We consider oblivious two-party protocols where a client outsources N blocks of private data to a se...
We study a protocol for distributed computation called shuffled check-in, which achieves strong priv...
Abstract—Shuffling is an effective method to build a publicly verifiable mix network to implement ve...
In this thesis we consider different mix network protocols. First, we discuss a protocol called cMix...
Card-based protocols allow to evaluate an arbitrary fixed Boolean function f on a hidden input to ob...
IoT devices have very strong requirements on all the resources such as memory, randomness, energy an...
The MIX technique forms the basis of many popular services that offer anonymity of communication in ...
We consider the problem of designing scalable, robust protocols for computing statistics about sensi...
Pre-printsInternational audienceWe revisit the popular adage that side-channel countermeasures must ...
We consider oblivious two-party protocols where a client outsources N blocks of private data to a se...
Together with masking, shuffling is one of the most frequently considered solutions to improve the s...
Abstract. Together with masking, shuffling is one of the most fre-quently considered solutions to im...
Abstract. In secure multi-party shuffling, multiple parties, each holding an input, want to agree on...