Fayaz Naikoo, Khaleel Ahmad, Khairol Amali Bin Ahmad
{"title":"启用匿名的混合网络:由于技术和正确性证明","authors":"Fayaz Naikoo, Khaleel Ahmad, Khairol Amali Bin Ahmad","doi":"10.1109/ICCCIS56430.2022.10037727","DOIUrl":null,"url":null,"abstract":"Anonymous communication channels play a vital role in enhancing privacy and security within communication networks. This research provides the overall survey of Mix Network -an anonymous communication channel. On the basis of the cryptographic operations used, the Mix Network has been classified into different types. The survey has been done to find out the important techniques used for the design of Mix Networks. Upon analysis, it has been seen that the two main techniques to design Mix Networks are decryption and re-encryption. Based on the verification proofs, publicly verifiable mix networks have been identified. Based on proof of correctness, either partially proof-of-correctness or complete-of-correctness mix networks have been identified. In this way, we will find out the robust mix networks designed so far within anonymous communication networks.","PeriodicalId":286808,"journal":{"name":"2022 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Anonymity-Enabled Mix Network: Owing to Techniques and Proof of correctness\",\"authors\":\"Fayaz Naikoo, Khaleel Ahmad, Khairol Amali Bin Ahmad\",\"doi\":\"10.1109/ICCCIS56430.2022.10037727\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Anonymous communication channels play a vital role in enhancing privacy and security within communication networks. This research provides the overall survey of Mix Network -an anonymous communication channel. On the basis of the cryptographic operations used, the Mix Network has been classified into different types. The survey has been done to find out the important techniques used for the design of Mix Networks. Upon analysis, it has been seen that the two main techniques to design Mix Networks are decryption and re-encryption. Based on the verification proofs, publicly verifiable mix networks have been identified. Based on proof of correctness, either partially proof-of-correctness or complete-of-correctness mix networks have been identified. In this way, we will find out the robust mix networks designed so far within anonymous communication networks.\",\"PeriodicalId\":286808,\"journal\":{\"name\":\"2022 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)\",\"volume\":\"50 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-11-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCIS56430.2022.10037727\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCIS56430.2022.10037727","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Anonymity-Enabled Mix Network: Owing to Techniques and Proof of correctness
Anonymous communication channels play a vital role in enhancing privacy and security within communication networks. This research provides the overall survey of Mix Network -an anonymous communication channel. On the basis of the cryptographic operations used, the Mix Network has been classified into different types. The survey has been done to find out the important techniques used for the design of Mix Networks. Upon analysis, it has been seen that the two main techniques to design Mix Networks are decryption and re-encryption. Based on the verification proofs, publicly verifiable mix networks have been identified. Based on proof of correctness, either partially proof-of-correctness or complete-of-correctness mix networks have been identified. In this way, we will find out the robust mix networks designed so far within anonymous communication networks.