2014 IEEE Symposium on Security and Privacy 2014
DOI: 10.1109/sp.2014.29
|View full text |Cite
|
Sign up to set email alerts
|

Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking

Abstract: Mix nets with randomized partial checking (RPC mix nets) have been introduced by Jakobsson, Juels, and Rivest as particularly simple and efficient verifiable mix nets. These mix nets have been used in several implementations of prominent e-voting systems to provide vote privacy and verifiability. In RPC mix nets, higher efficiency is traded for a lower level of privacy and verifiability. However, these mix nets have never undergone a rigorous formal analysis. Recently, Kahazei and Wikström even pointed out sev… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
40
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 24 publications
(42 citation statements)
references
References 15 publications
(28 reference statements)
0
40
0
Order By: Relevance
“…It shortly discusses the utility of adding RPC (Randomized Integrity Checking) to cMix, an integrity check mechanism introduced by Jacobsson, Juels and Rivest [16], and further analyzed and developed in Refs. [17,18]. The usage of RPC in the cMix system is that each node commits to a randomly chosen permutation, publishes its input and output, and validates that it has followed the protocol correctly by revealing a (large) fraction of its secret input/output pairs, where these pairs are selected by the other nodes (or by a random oracle).…”
Section: Features and Extensionsmentioning
confidence: 99%
See 1 more Smart Citation
“…It shortly discusses the utility of adding RPC (Randomized Integrity Checking) to cMix, an integrity check mechanism introduced by Jacobsson, Juels and Rivest [16], and further analyzed and developed in Refs. [17,18]. The usage of RPC in the cMix system is that each node commits to a randomly chosen permutation, publishes its input and output, and validates that it has followed the protocol correctly by revealing a (large) fraction of its secret input/output pairs, where these pairs are selected by the other nodes (or by a random oracle).…”
Section: Features and Extensionsmentioning
confidence: 99%
“…Notes on the RPC mechanism. RPC makes the nodes reveal a (large) fraction of their secret information, which could break the anonymity of the users [18]. As an example, let us assume that each node performs only one permutation and proves the correctness of its output for this permutation.…”
Section: Figure 3 the Insider Attackmentioning
confidence: 99%
“…Küsters et. al [15], provide a formal security analysis of Chaumian RPC Mix Nets. They propose a new security definition, called accountability, which allows one to measure the level of privacy and verifiability of such a Mix Net precisely.…”
Section: Previous Workmentioning
confidence: 99%
“…Most of the formal analysis efforts for modern e-voting systems have concentrated on the design level, performing cryptographic analysis (see [15][16][17][18][19][20] for some of our own efforts in this direction). One main goal of this work is to extend such an analysis and perform it on the implemen- Brought to you by | New York University Bobst Library Technical Services Authenticated Download Date | 5/30/15 10:41 AM tation level directly.…”
Section: Security Properties Of Modern E-voting Systemsmentioning
confidence: 99%
“…This list constitutes the official result of the election process. Altogether, the core of sElect is a simple variant of what is called a Chaumian mix net (see, for example, [20] for more information and further references on mix nets).…”
Section: Tallying Phasementioning
confidence: 99%