Privacy-preserving set operations

L Kissner, D Song - Annual International Cryptology Conference, 2005 - Springer
In many important applications, a collection of mutually distrustful parties must perform
private computation over multisets. Each party's input to the function is his private input …

Mixminion: Design of a type III anonymous remailer protocol

G Danezis, R Dingledine… - 2003 Symposium on …, 2003 - ieeexplore.ieee.org
We present Mixminion, a message-based anonymous remailer protocol with secure single-
use reply blocks. Mix nodes cannot distinguish Mixminion forward messages from reply …

Traffic analysis: Protocols, attacks, design issues, and open problems

JF Raymond - … : International Workshop on Design Issues in …, 2001 - Springer
We present the trafic analysis problem and expose the most important protocols, attacks and
design issues. Afterwards, we propose directions for further research. As we are mostly …

Efficient zero-knowledge argument for correctness of a shuffle

S Bayer, J Groth - Advances in Cryptology–EUROCRYPT 2012: 31st …, 2012 - Springer
Mix-nets are used in e-voting schemes and other applications that require anonymity.
Shuffles of homomorphic encryptions are often used in the construction of mix-nets. A shuffle …

Universal re-encryption for mixnets

P Golle, M Jakobsson, A Juels, P Syverson - Topics in Cryptology–CT …, 2004 - Springer
We introduce a new cryptographic technique that we call universal re-encryption. A
conventional cryptosystem that permits re-encryption, such as ElGamal, does so only for a …

[PDF][PDF] Compromising electromagnetic emanations of wired and wireless keyboards.

M Vuagnoux, S Pasini - USENIX security symposium, 2009 - usenix.org
Computer keyboards are often used to transmit confidential data such as passwords. Since
they contain electronic components, keyboards eventually emit electromagnetic waves …

Making mix nets robust for electronic voting by randomized partial checking

M Jakobsson, A Juels, RL Rivest - 11th USENIX Security Symposium …, 2002 - usenix.org
We propose a new technique for making mix nets robust, called randomized partial checking
(RPC). The basic idea is that rather than providing a proof of completely correct operation …

Traffic analysis attacks and trade-offs in anonymity providing systems

A Back, U Möller, A Stiglic - International Workshop on Information Hiding, 2001 - Springer
We discuss problems and trade-offs with systems providing anonymity for web browsing (or
more generally any communication system that requires low latency interaction). We focus …

[PDF][PDF] A Practical Congestion Attack on Tor Using Long Paths.

NS Evans, R Dingledine, C Grothoff - USENIX Security Symposium, 2009 - usenix.org
Abstract In 2005, Murdoch and Danezis demonstrated the first practical congestion attack
against a deployed anonymity network. They could identify which relays were on a target Tor …

Privacy in targeted advertising on mobile devices: a survey

I Ullah, R Boreli, SS Kanhere - International Journal of Information …, 2023 - Springer
Targeted advertising has transformed the marketing landscape for a wide variety of
businesses, by creating new opportunities for advertisers to reach prospective customers by …