Mohammadhassan Ameri Ekhtiarabadi, H. Yajam, J. Mohajeri, M. Salmasizadeh
{"title":"Verifiable identity-based mix network","authors":"Mohammadhassan Ameri Ekhtiarabadi, H. Yajam, J. Mohajeri, M. Salmasizadeh","doi":"10.1109/IRANIANCEE.2015.7146249","DOIUrl":null,"url":null,"abstract":"Privacy is a matter of concern in the digital world, and it is gaining importance by development of digital communications. Cryptography is an integral tool for preserving users privacy. In the case of communication privacy, mix networks provide efficient and reliable ways of maintaining the privacy. In practical applications, mix networks should resist against active adversaries which have access to corrupt mix servers or users. The most common solution for mix nets to resist against active attacks is verifiable mix networks. However, up until now all proposed verifiable mix network schemes were dependent to Public Key Infrastructure. In this manuscript, we propose a verifiable identity-based mix network scheme.","PeriodicalId":187121,"journal":{"name":"2015 23rd Iranian Conference on Electrical Engineering","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 23rd Iranian Conference on Electrical Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IRANIANCEE.2015.7146249","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Privacy is a matter of concern in the digital world, and it is gaining importance by development of digital communications. Cryptography is an integral tool for preserving users privacy. In the case of communication privacy, mix networks provide efficient and reliable ways of maintaining the privacy. In practical applications, mix networks should resist against active adversaries which have access to corrupt mix servers or users. The most common solution for mix nets to resist against active attacks is verifiable mix networks. However, up until now all proposed verifiable mix network schemes were dependent to Public Key Infrastructure. In this manuscript, we propose a verifiable identity-based mix network scheme.