STOC '91 Proceedings of the twenty-third annual ACM symposium on Theory of computing
Proceedings of the eighteenth annual ACM symposium on Principles of distributed computing
A verifiable secret shuffle and its application to e-voting
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
Publicly Verifiable Lotteries: Applications of Delaying Functions
FC '98 Proceedings of the Second International Conference on Financial Cryptography
A Reputation System to Increase MIX-Net Reliability
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Proofs of Work and Bread Pudding Protocols
CMS '99 Proceedings of the IFIP TC6/TC11 Joint Working Conference on Secure Information Networks: Communications and Multimedia Security
ACSAC '98 Proceedings of the 14th Annual Computer Security Applications Conference
Weakly Secret Bit Commitment: Applications to Lotteries and Fair Exchange
CSFW '98 Proceedings of the 11th IEEE workshop on Computer Security Foundations
Time-lock Puzzles and Timed-release Crypto
Time-lock Puzzles and Timed-release Crypto
Pricing via Processing or Combatting Junk Mail
Pricing via Processing or Combatting Junk Mail
How to break a practical MIX and design a new one
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Real-time mixes: a bandwidth-efficient anonymity protocol
IEEE Journal on Selected Areas in Communications
Reputation in privacy enhancing technologies
Proceedings of the 12th annual conference on Computers, freedom and privacy
From a Trickle to a Flood: Active Attacks on Several Mix Types
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Mixminion: Design of a Type III Anonymous Remailer Protocol
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Proceedings of the 11th ACM conference on Computer and communications security
Journal of the American Society for Information Science and Technology
Providing witness anonymity in peer-to-peer systems
Proceedings of the 13th ACM conference on Computer and communications security
Cashmere: resilient anonymous routing
NSDI'05 Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Low-resource routing attacks against tor
Proceedings of the 2007 ACM workshop on Privacy in electronic society
Denial of service or denial of security?
Proceedings of the 14th ACM conference on Computer and communications security
The impact of incentive mechanisms in multi-channel mobile music distribution
Multimedia Tools and Applications
Revocation games in ephemeral networks
Proceedings of the 15th ACM conference on Computer and communications security
Evaluation of anonymity of practical anonymous communication networks
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Providing witness anonymity under peer-to-peer settings
IEEE Transactions on Information Forensics and Security
Dissent: accountable anonymous group messaging
Proceedings of the 17th ACM conference on Computer and communications security
CONCUR'10 Proceedings of the 21st international conference on Concurrency theory
Trust-based anonymous communication: adversary models and routing algorithms
Proceedings of the 18th ACM conference on Computer and communications security
Minimising anonymity loss in anonymity networks under DoS attacks
ICICS'11 Proceedings of the 13th international conference on Information and communications security
Building reliable mix networks with fair exchange
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Practical traffic analysis: extending and resisting statistical disclosure
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
Synchronous batching: from cascades to free routes
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
On the PET workshop panel “mix cascades versus peer-to-peer: is one concept superior?”
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
FC'10 Proceedings of the 14th international conference on Financial Cryptography and Data Security
Mobile music distribution: a multichannel approach
Advances in Multimedia
Hi-index | 0.00 |
We describe a MIX cascade protocol and a reputation system that together increase the reliability of a network of MIX cascades. In our protocol, MIX nodes periodically generate a communally random seed that, along with their reputations, determines cascade configuration. Nodes send test messages to monitor their cascades. Senders can also demonstrate message decryptions to convince honest cascade members that a cascade is misbehaving. By allowing any node to declare the failure of its own cascade, we eliminate the need for global trusted witnesses.