Theory of Cryptography
DOI: 10.1007/978-3-540-70936-7_30
|View full text |Cite
|
Sign up to set email alerts
|

How to Shuffle in Public

Abstract: We show how to obfuscate a secret shuffle of ciphertexts: shuffling becomes a public operation. Given a trusted party that samples and obfuscates a shuffle before any ciphertexts are received, this reduces the problem of constructing a mix-net to verifiable joint decryption. We construct public-key obfuscations of a decryption shuffle based on the Boneh-Goh-Nissim (BGN) cryptosystem and a re-encryption shuffle based on the Paillier cryptosystem. Both allow efficient distributed verifiable decryption. Finally, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
64
0

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 56 publications
(64 citation statements)
references
References 34 publications
(43 reference statements)
0
64
0
Order By: Relevance
“…We show that this is the case as long as t = O (1). However, when t = ω(1), major (and seemingly inherent) difficulties rise.…”
Section: Our Techniquesmentioning
confidence: 69%
See 4 more Smart Citations
“…We show that this is the case as long as t = O (1). However, when t = ω(1), major (and seemingly inherent) difficulties rise.…”
Section: Our Techniquesmentioning
confidence: 69%
“…Here VGB comes to our aid when t = ω (1). That is, having limited oracle access to the point programs and sufficient power to compute the distinguishing elements allows performing the required simulation.…”
Section: Our Techniquesmentioning
confidence: 99%
See 3 more Smart Citations