A survey on anonymous communication systems with a focus on dining cryptographers networks
Traffic analysis attacks can counteract end-to-end encryption and use leaked
communication metadata to reveal information about communicating parties. With an ever …
communication metadata to reveal information about communicating parties. With an ever …
Rollercoaster: An Efficient {Group-Multicast} Scheme for Mix Networks
Mix network designs such as Loopix provide strong metadata anonymity guarantees that are
crucial across many applications. However, because they limit the rate at which messages …
crucial across many applications. However, because they limit the rate at which messages …
Evaluation Techniques for Mix Networks
I BEN GUIRAT - 2024 - lirias.kuleuven.be
This project focuses on investigating anonymous communication networks, specifically
mixnets. This research will involve proposing privacy metrics, techniques, and analysis …
mixnets. This research will involve proposing privacy metrics, techniques, and analysis …
Source Material
C Adams, C Adams - Introduction to Privacy Enhancing Technologies: A …, 2021 - Springer
This chapter amalgamates the references from all the previous chapters in the book.
However, as an aid to students and researchers in the field, a hyperlink is added for (almost) …
However, as an aid to students and researchers in the field, a hyperlink is added for (almost) …
Limiting Exposure by Hiding the Identity
C Adams, C Adams - Introduction to Privacy Enhancing Technologies: A …, 2021 - Springer
This chapter examines PETs that limit exposure by hiding the user's identity information. As
examples of this category, the following PETs are described: mix networks; anonymous …
examples of this category, the following PETs are described: mix networks; anonymous …
Evaluating a mixnet based on threshold cryptography regarding its resilience-cost trade-off
PI Castillo - 2024 - upcommons.upc.edu
A mix network (mixnet) is a type of anonymous communication network that aims to enable
its users to send messages anonymously to each other in the presence of a global network …
its users to send messages anonymously to each other in the presence of a global network …