In this thesis we consider different mix network protocols. First, we discuss a protocol called cMix. We describe the concept of verifiable shuffling, that enable mixnodes to prove that they operate correctly according to the protocol. We present three protocols for verifiable shuffling a list of encrypted elements, the Naive protocol, the Simple n-shuffle and the Permutation matrix protocol. The first two make use of the fact that polynomials remain invariant under permutation of their roots, and the last makes use of a permutation matrix. We discuss security achieved in all of our protocols, and explain how many exponentiations they require
We make use of a universal re-encryption mixnet to efficiently perform a secure multiparty computati...
Together with masking, shuffling is one of the most frequently considered solutions to improve the s...
In this paper we present the first fully post-quantum proof of a shuffle for RLWE encryption schemes...
Abstract—Shuffling is an effective method to build a publicly verifiable mix network to implement ve...
Abstract. We show how to obfuscate a secret shuffle of ciphertexts: shuffling becomes a public opera...
We propose a variant of the Paillier cryptosystem that improves efficiency in encryption, re-encrypt...
© 2012 Kim RamchenCryptographic mixnets are a fundamental tool in the construction of secure electro...
A mix network by Wikstrom fails in correctness, provable privacy and soundness. Its claimed advantag...
We suggest an honest verifier zero-knowledge argument for the correctness of a shuffle of homomorphi...
Abstract. This paper addresses the security and efficiency issues of the Mix-net based on permutatio...
This paper provides the first verifiable shuffle specifically for fully homomorphic schemes. A verif...
The set of input-output permutations that are routable through a multistage interconnection network ...
Similar to verifiable shuffling (mixing), we consider the problem of verifiable rotating a given lis...
A shuffle of a set of ciphertexts is a new set of ciphertexts with the same plaintexts in permuted o...
Since David Chaum introduced the idea of mix nets 40 years ago, they have become widely used buildin...
We make use of a universal re-encryption mixnet to efficiently perform a secure multiparty computati...
Together with masking, shuffling is one of the most frequently considered solutions to improve the s...
In this paper we present the first fully post-quantum proof of a shuffle for RLWE encryption schemes...
Abstract—Shuffling is an effective method to build a publicly verifiable mix network to implement ve...
Abstract. We show how to obfuscate a secret shuffle of ciphertexts: shuffling becomes a public opera...
We propose a variant of the Paillier cryptosystem that improves efficiency in encryption, re-encrypt...
© 2012 Kim RamchenCryptographic mixnets are a fundamental tool in the construction of secure electro...
A mix network by Wikstrom fails in correctness, provable privacy and soundness. Its claimed advantag...
We suggest an honest verifier zero-knowledge argument for the correctness of a shuffle of homomorphi...
Abstract. This paper addresses the security and efficiency issues of the Mix-net based on permutatio...
This paper provides the first verifiable shuffle specifically for fully homomorphic schemes. A verif...
The set of input-output permutations that are routable through a multistage interconnection network ...
Similar to verifiable shuffling (mixing), we consider the problem of verifiable rotating a given lis...
A shuffle of a set of ciphertexts is a new set of ciphertexts with the same plaintexts in permuted o...
Since David Chaum introduced the idea of mix nets 40 years ago, they have become widely used buildin...
We make use of a universal re-encryption mixnet to efficiently perform a secure multiparty computati...
Together with masking, shuffling is one of the most frequently considered solutions to improve the s...
In this paper we present the first fully post-quantum proof of a shuffle for RLWE encryption schemes...