Vis enkel innførsel

dc.contributor.authorHaines, Thomas Edmund
dc.contributor.authorPereira, Olivier
dc.date.accessioned2021-09-06T10:47:24Z
dc.date.available2021-09-06T10:47:24Z
dc.date.created2021-01-11T11:02:19Z
dc.date.issued2020
dc.identifier.issn0302-9743
dc.identifier.urihttps://hdl.handle.net/11250/2773710
dc.description.abstractMarked mix-nets were introduced by Pereira and Rivest as a mechanism to allow very efficient mixing that ensures privacy but at the cost of not guaranteeing integrity. This is useful in a number of e-voting schemes such as STAR-Vote and Selene. However, the proposed marked mix-net construction comes with no proof of security and, as we show in this paper, does not provide privacy even in the presence of a single corrupt authority. Fortunately, the attack that we present is easy to prevent and we show several possible ways to address it. Finally while the original marked mix-net paper worked with ElGamal, we identify conditions that the adopted encryption scheme should satisfy in order to be appropriate for a marked mix-net. This opens the possibility of building marked mix-nets based on intractability assumptions which are believed to hold in the presence of a quantum computer.en_US
dc.language.isoengen_US
dc.publisherSpringeren_US
dc.titleShort Paper: An Update on Marked Mix-Nets: An Attack, a Fix and PQ Possibilitiesen_US
dc.typePeer revieweden_US
dc.typeJournal articleen_US
dc.description.versionacceptedVersionen_US
dc.source.journalLecture Notes in Computer Science (LNCS)en_US
dc.identifier.doi10.1007/978-3-030-54455-3_26
dc.identifier.cristin1868723
cristin.ispublishedtrue
cristin.fulltextpostprint
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel