Attack and Correction: How to Design a Secure and Efficient Mix Network


Kun Peng, Journal of Information Processing Systems Vol. 8, No. 1, pp. 175-190, Mar. 2012  

https://doi.org/10.3745/JIPS.2012.8.1.175
Keywords: Mix Network, Correction
Fulltext:

Abstract

Shuffling is an effective method to build a publicly verifiable mix network to implement verifiable anonymous channels that can be used for important cryptographic applications like electronic voting and electronic cash. One shuffling scheme by Groth is claimed to be secure and efficient. However, its soundness has not been formally proven. An attack against the soundness of this shuffling scheme is presented in this paper. Such an attack compromises the soundness of the mix network based on it. Two new shuffling protocols are designed on the basis of Groth"'"s shuffling and batch verification techniques. The first new protocol is not completely sound, but is formally analyzed in regards to soundness, so it can be applied to build a mix network with formally proven soundness. The second new protocol is completely sound, so is more convenient to apply. Formal analysis in this paper guarantees that both new shuffling protocols can be employed to build mix networks with formally provable soundness. Both protocols prevent the attack against soundness in Groth"'"s scheme. Both new shuffling protocols are very efficient as batch-verification-based efficiency-improving mechanisms have been adopted. The second protocol is even simpler and more elegant than the first one as it is based on a novel batch cryptographic technique.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.




Cite this article
[APA Style]
Peng, K. (2012). Attack and Correction: How to Design a Secure and Efficient Mix Network. Journal of Information Processing Systems, 8(1), 175-190. DOI: 10.3745/JIPS.2012.8.1.175.

[IEEE Style]
K. Peng, "Attack and Correction: How to Design a Secure and Efficient Mix Network," Journal of Information Processing Systems, vol. 8, no. 1, pp. 175-190, 2012. DOI: 10.3745/JIPS.2012.8.1.175.

[ACM Style]
Kun Peng. 2012. Attack and Correction: How to Design a Secure and Efficient Mix Network. Journal of Information Processing Systems, 8, 1, (2012), 175-190. DOI: 10.3745/JIPS.2012.8.1.175.