Questions tagged [mixnets]
Mix networks are routing protocols that create hard-to-trace communications by using a chain of proxy servers known as mixes which take in messages from multiple senders, shuffle them, and send them back out in random order to the next destination (possibly another mix node). This breaks the link between the source of the request and the destination, making it harder for eavesdroppers to trace end-to-end communications.
22 questions
1 vote
1 answer
77 views
Research article with error? Mixnet pseudocode not working
I tried to implement the mixnet pseudocode in this article (Pseudo-Code Algorithms for Verifiable Re-Encryption Mix-Nets), but one of the equalities to check the proof correctness is not matching. I ...
3 votes
1 answer
208 views
Do random numbers avoid replay attacks in Chaum's mixes?
So I've been visiting a security lecture at my university and they introduced the concept of Chaum's mixes to us and how replay attacks can compromise the anonymity granted by a mixnet. It is ...
2 votes
0 answers
116 views
Efficient Zero Knowledge Proof for proving a reencryption shuffling for an arbitrary table
I have a problem where I have a table of various reencryptable/rerandomizable ciphertexts (Paillier, Elgamal, EC Additive Elgamal). Each row on a given table has the same structure, but each column ...
0 votes
1 answer
93 views
Oblivious Decision Making
Suppose there is a ciphertext $C_1$ that hides message $m_1$ using a distributed additively homomorphic public key. I would like the holders of the key to run a protocol where if $m_1 = 0$, then it ...
1 vote
0 answers
64 views
Paillier cryptosystem for verifiable shuffles
I am looking for some algorithm or implementation on Pailler cryptosystem-based verifiable shuffles for mixNet. So far, all the verifiable shuffles and mixNet are available for ElGamal cryptosystems ...
3 votes
1 answer
121 views
Can you derive the public key from a PGP encrypted message without knowing the message content?
I am working on a system to transfer short messages while obfuscating the intended recipient. In essence, it combines many messages encrypted using PGP, and periodically publishes a file containing ...
0 votes
0 answers
199 views
Decryption of an El Gamal re encryption mixnet
I have interest in e-voting and am currently trying to understand El Gamal re-encryption mixnet. I understand how El Gamal encryption works and how mixnet works but what's not cristal clear for me is ...
0 votes
1 answer
221 views
Implementation of a decryption mixnet, and problems with the size of the key
I've been studying decryption mixnets, in the context of e-voting and stealth networks. Let's describe it in a very simplified way. The concept is pretty simple. A message M is forwarded through ...
1 vote
0 answers
265 views
Difference between DCnet and mixnet in terms of forwarding anonymity?
It seems that with both anonymous communication protocols we can achieve some level of forwarding anonymity, however, is one protocol better than the other in this respect? It seems that they both ...
5 votes
1 answer
203 views
How do mix networks work with server downtime?
I am looking for an analysis of practical mix networks with server downtime. For example, if a message is supposed to go from A -> B -> C -> D, what happens if B wants to send the message but C is ...
1 vote
2 answers
210 views
Implementing commitments and challenges for a distributed ElGamal encryption scheme
I am trying to implement a distributed encryption system by having as a main source of information this book (Introduction to Cryptography by Delfs and Knebl) and this Internet article (More Mix than ...
1 vote
1 answer
445 views
Security proof of mix net
I am writing an exercise in cryptography about anonymous communication. One of the systems I have looked into is the mix net protocol. I want to prove that this is secure. I have seen many different ...
1 vote
1 answer
308 views
Generating ElGamal parameters in a mix net
I am reading this paper regarding re-encryption mix nets. I want to implement my own for educational purposes and I am stuck at the initial steps of how I should generate the keys and distribute them. ...
6 votes
2 answers
258 views
Layered encryption in mixnets with post-quantum cryptography
I am trying to implement a mixnet using post-quantum public-key crypto. Each message may be encrypted by up to 10 levels of public keys, shuffled, before the layers of encryption are stripped off one ...
3 votes
0 answers
127 views
High-latency anonymous communication minimum delay?
High-latency anonymous communication (e.g. Mixmaster and Mixminion) delay messages for a long time using mixers to anonymous communications. I understand that it has applications for email and p2p but ...