Auditable privacy: On tamper-evident mix networks

Jong Youl Choi, Philippe Golle, Markus Jakobsson

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Scopus citations

Abstract

We introduce the notion of tamper-evidence for mix networks in order to defend against attacks aimed at covertly leaking secret information held by corrupted mix servers. This is achieved by letting observers (which need not be trusted) verify the absence of covert channels by means of techniques we introduce herein. Our tamper-evident mix network is a type of re-encryption mixnet in which a server proves that the permutation and re-encryption factors that it uses are correctly derived from a random seed to which the server is committed.

Original languageEnglish
Title of host publicationFinancial Cryptography and Data Security - 10th International Conference, FC 2006, Revised Selected Papers
PublisherSpringer Verlag
Pages126-141
Number of pages16
ISBN (Print)3540462554, 9783540462552
DOIs
StatePublished - 2006
Externally publishedYes
Event10th International Conference on Financial Cryptography and Data Security, FC 2006 - , Anguilla
Duration: Feb 27 2006Mar 2 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4107 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference10th International Conference on Financial Cryptography and Data Security, FC 2006
Country/TerritoryAnguilla
Period02/27/0603/2/06

Keywords

  • Covert channel
  • Malware
  • Mix network
  • Observer
  • Subliminal channel
  • Tamper-evident

Fingerprint

Dive into the research topics of 'Auditable privacy: On tamper-evident mix networks'. Together they form a unique fingerprint.

Cite this