A Secure and Efficient Mix-Network using Extended Binary Mixing Gate

نویسندگان

  • Kun Peng
  • Riza Aditya
  • Colin Boyd
  • Ed Dawson
  • Byoungcheon Lee
چکیده

A mix-network accepts a set of ciphertexts and outputs the corresponding plaintexts in a random order. It is an important tool in schemes requiring anonymity of messages, such as in secure e-voting and e-auction schemes. A mix-network is comprised of shuffling and decryption operations. A robust mix-network must provide proofs that it shuffles and decrypts its input ciphertexts and outputs their corresponding plaintexts correctly. Verifying such proofs is often a bottleneck affecting the performance of the mix-network. We propose a secure and efficient mix-network employing extended binary mixing gates (EBMGs) using batching techniques to re-encrypt the ciphertexts, and produce and verify the proofs of correct shuffling. The proposed mix-network offers sufficient anonymity and high performance level compared to other mix-network schemes.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Characterization of EME with Linear Mixing

Encrypt-Mix-Encrypt is a type of SPRP based construction, where a masked plaintext is encrypted in ECB mode of, then a non-linear mixing is performed and then again an encryption is performed in ECB mode which is masked to produce the ciphertext. Using the property of the binary field, the authors proved that the construction is not SPRP secure if the mixing used is linear. In this paper, we ob...

متن کامل

Secure FPGA Design by Filling Unused Spaces

Nowadays there are different kinds of attacks on Field Programmable Gate Array (FPGA). As FPGAs are used in many different applications, its security becomes an important concern, especially in Internet of Things (IoT) applications. Hardware Trojan Horse (HTH) insertion is one of the major security threats that can be implemented in unused space of the FPGA. This unused space is unavoidable to ...

متن کامل

An Improved Algorithm for Network Reliability Evaluation

Binary Decision Diagram (BDD) is a data structure proved to be compact in representation and efficient in manipulation of Boolean formulas. Using Binary decision diagram in network reliability analysis has already been investigated by some researchers. In this paper we show how an exact algorithm for network reliability can be improved and implemented efficiently by using CUDD - Colorado Univer...

متن کامل

Hardware Implementation of Efficient Modified Karatsuba Multiplier Used in Elliptic Curves

The efficiency of the core Galois field arithmetic improves the performance of elliptic curve based public key cryptosystem implementation. This paper describes the design and implementation of a reconfigurable Galois field multiplier, which is implemented using field programmable gate arrays (FPGAs). The multiplier of Galois field based on Karatsuba’s divide and conquer algorithm allows for re...

متن کامل

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004