Fayaz Naikoo, Khaleel Ahmad, Khairol Amali Bin Ahmad
{"title":"Anonymity-Enabled Mix Network: Owing to Techniques and Proof of correctness","authors":"Fayaz Naikoo, Khaleel Ahmad, Khairol Amali Bin Ahmad","doi":"10.1109/ICCCIS56430.2022.10037727","DOIUrl":null,"url":null,"abstract":"Anonymous communication channels play a vital role in enhancing privacy and security within communication networks. This research provides the overall survey of Mix Network -an anonymous communication channel. On the basis of the cryptographic operations used, the Mix Network has been classified into different types. The survey has been done to find out the important techniques used for the design of Mix Networks. Upon analysis, it has been seen that the two main techniques to design Mix Networks are decryption and re-encryption. Based on the verification proofs, publicly verifiable mix networks have been identified. Based on proof of correctness, either partially proof-of-correctness or complete-of-correctness mix networks have been identified. In this way, we will find out the robust mix networks designed so far within anonymous communication networks.","PeriodicalId":286808,"journal":{"name":"2022 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCIS56430.2022.10037727","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Anonymous communication channels play a vital role in enhancing privacy and security within communication networks. This research provides the overall survey of Mix Network -an anonymous communication channel. On the basis of the cryptographic operations used, the Mix Network has been classified into different types. The survey has been done to find out the important techniques used for the design of Mix Networks. Upon analysis, it has been seen that the two main techniques to design Mix Networks are decryption and re-encryption. Based on the verification proofs, publicly verifiable mix networks have been identified. Based on proof of correctness, either partially proof-of-correctness or complete-of-correctness mix networks have been identified. In this way, we will find out the robust mix networks designed so far within anonymous communication networks.