In TCC 2007, Adida and Wikström proposed a novel approach to shuffle, called a public shuffle, in which a shuffler can perform shuffle publicly without needing information kept secret. Their scheme uses an encrypted permutation matrix to shuffle ciphertexts publicly. This approach significantly reduces the cost of constructing a mix-net to verifiable joint decryption. Though their method is successful in making shuffle to be a public operation, their scheme still requires that some trusted parties should choose a permutation to be encrypted and construct zero-knowledge proofs on the well-formedness of this permutation. In this paper, we propose a method to construct a public shuffle without relying on permutations and randomizers generate...
We construct the most efficient known pairing-based NIZK shuffle argument. It consists of three suba...
A secret-shared shuffle (SSS) protocol permutes a secret-shared vector using a random secret permuta...
In order to guarantee a fair and transparent voting process, electronic voting schemes must be verif...
We show how to public-key obfuscate two commonly used shuffles: decryption shuffles which permute an...
Abstract. We show how to obfuscate a secret shuffle of ciphertexts: shuffling becomes a public opera...
We suggest an honest verifier zero-knowledge argument for the correctness of a shuffle of homomorphi...
International audienceAnonymity is a primary ingredient for our digital life. Several tools have bee...
Abstract. A proof of a shuffle is a zero-knowledge proof that one list of ciphertexts is a permutati...
A shuffle of a set of ciphertexts is a new set of ciphertexts with the same plaintexts in permuted o...
In an electronic voting procedure, mixing networks are used to ensure anonymity of the casted votes....
We propose a variant of the Paillier cryptosystem that improves efficiency in encryption, re-encrypt...
In this paper we present the first fully post-quantum proof of a shuffle for RLWE encryption schemes...
In secure multi-party shuffling, multiple parties, each holding an input, want to agree on a random ...
In electronic voting or whistle blowing, anonymity is necessary. Shuffling is a network security tec...
One way to guarantee security against malicious voting servers is to use NIZK shuffle arguments. Up...
We construct the most efficient known pairing-based NIZK shuffle argument. It consists of three suba...
A secret-shared shuffle (SSS) protocol permutes a secret-shared vector using a random secret permuta...
In order to guarantee a fair and transparent voting process, electronic voting schemes must be verif...
We show how to public-key obfuscate two commonly used shuffles: decryption shuffles which permute an...
Abstract. We show how to obfuscate a secret shuffle of ciphertexts: shuffling becomes a public opera...
We suggest an honest verifier zero-knowledge argument for the correctness of a shuffle of homomorphi...
International audienceAnonymity is a primary ingredient for our digital life. Several tools have bee...
Abstract. A proof of a shuffle is a zero-knowledge proof that one list of ciphertexts is a permutati...
A shuffle of a set of ciphertexts is a new set of ciphertexts with the same plaintexts in permuted o...
In an electronic voting procedure, mixing networks are used to ensure anonymity of the casted votes....
We propose a variant of the Paillier cryptosystem that improves efficiency in encryption, re-encrypt...
In this paper we present the first fully post-quantum proof of a shuffle for RLWE encryption schemes...
In secure multi-party shuffling, multiple parties, each holding an input, want to agree on a random ...
In electronic voting or whistle blowing, anonymity is necessary. Shuffling is a network security tec...
One way to guarantee security against malicious voting servers is to use NIZK shuffle arguments. Up...
We construct the most efficient known pairing-based NIZK shuffle argument. It consists of three suba...
A secret-shared shuffle (SSS) protocol permutes a secret-shared vector using a random secret permuta...
In order to guarantee a fair and transparent voting process, electronic voting schemes must be verif...