Privacy-preserving set operations
L Kissner, D Song - Annual International Cryptology Conference, 2005 - Springer
In many important applications, a collection of mutually distrustful parties must perform
private computation over multisets. Each party's input to the function is his private input …
private computation over multisets. Each party's input to the function is his private input …
Mixminion: Design of a type III anonymous remailer protocol
We present Mixminion, a message-based anonymous remailer protocol with secure single-
use reply blocks. Mix nodes cannot distinguish Mixminion forward messages from reply …
use reply blocks. Mix nodes cannot distinguish Mixminion forward messages from reply …
Traffic analysis: Protocols, attacks, design issues, and open problems
JF Raymond - … : International Workshop on Design Issues in …, 2001 - Springer
We present the trafic analysis problem and expose the most important protocols, attacks and
design issues. Afterwards, we propose directions for further research. As we are mostly …
design issues. Afterwards, we propose directions for further research. As we are mostly …
Efficient zero-knowledge argument for correctness of a shuffle
S Bayer, J Groth - Advances in Cryptology–EUROCRYPT 2012: 31st …, 2012 - Springer
Mix-nets are used in e-voting schemes and other applications that require anonymity.
Shuffles of homomorphic encryptions are often used in the construction of mix-nets. A shuffle …
Shuffles of homomorphic encryptions are often used in the construction of mix-nets. A shuffle …
Universal re-encryption for mixnets
We introduce a new cryptographic technique that we call universal re-encryption. A
conventional cryptosystem that permits re-encryption, such as ElGamal, does so only for a …
conventional cryptosystem that permits re-encryption, such as ElGamal, does so only for a …
[PDF][PDF] Compromising electromagnetic emanations of wired and wireless keyboards.
Computer keyboards are often used to transmit confidential data such as passwords. Since
they contain electronic components, keyboards eventually emit electromagnetic waves …
they contain electronic components, keyboards eventually emit electromagnetic waves …
Making mix nets robust for electronic voting by randomized partial checking
We propose a new technique for making mix nets robust, called randomized partial checking
(RPC). The basic idea is that rather than providing a proof of completely correct operation …
(RPC). The basic idea is that rather than providing a proof of completely correct operation …
Traffic analysis attacks and trade-offs in anonymity providing systems
A Back, U Möller, A Stiglic - International Workshop on Information Hiding, 2001 - Springer
We discuss problems and trade-offs with systems providing anonymity for web browsing (or
more generally any communication system that requires low latency interaction). We focus …
more generally any communication system that requires low latency interaction). We focus …
[PDF][PDF] A Practical Congestion Attack on Tor Using Long Paths.
Abstract In 2005, Murdoch and Danezis demonstrated the first practical congestion attack
against a deployed anonymity network. They could identify which relays were on a target Tor …
against a deployed anonymity network. They could identify which relays were on a target Tor …
Privacy in targeted advertising on mobile devices: a survey
Targeted advertising has transformed the marketing landscape for a wide variety of
businesses, by creating new opportunities for advertisers to reach prospective customers by …
businesses, by creating new opportunities for advertisers to reach prospective customers by …