Skip to main content

Fragile mixing

Publication ,  Conference
Reiter, MK; Wang, X
Published in: Proceedings of the ACM Conference on Computer and Communications Security
January 1, 2004

No matter how well designed and engineered, a mix server offers little protection if its administrator can be convinced to log and selectively disclose correspondences between its input and output messages, either for profit or to cooperate with an investigation. In this paper we propose a technique, fragile mixing, to discourage an administrator from revealing such correspondences, assuming he is motivated to protect the unlinkability of other communications that flow through the mix (e.g., his own). Briefly, fragile mixing implements the property that any disclosure of an input-message-to-output-message correspondence discloses all such correspondences for that batch of output messages. We detail this technique in the context of a re-encryption mix, its integration with a mix network, and incentive and efficiency issues. Copyright 2004 ACM.

Duke Scholars

Published In

Proceedings of the ACM Conference on Computer and Communications Security

DOI

ISSN

1543-7221

Publication Date

January 1, 2004

Start / End Page

227 / 235
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Reiter, M. K., & Wang, X. (2004). Fragile mixing. In Proceedings of the ACM Conference on Computer and Communications Security (pp. 227–235). https://doi.org/10.1145/1030083.1030114
Reiter, M. K., and X. Wang. “Fragile mixing.” In Proceedings of the ACM Conference on Computer and Communications Security, 227–35, 2004. https://doi.org/10.1145/1030083.1030114.
Reiter MK, Wang X. Fragile mixing. In: Proceedings of the ACM Conference on Computer and Communications Security. 2004. p. 227–35.
Reiter, M. K., and X. Wang. “Fragile mixing.” Proceedings of the ACM Conference on Computer and Communications Security, 2004, pp. 227–35. Scopus, doi:10.1145/1030083.1030114.
Reiter MK, Wang X. Fragile mixing. Proceedings of the ACM Conference on Computer and Communications Security. 2004. p. 227–235.

Published In

Proceedings of the ACM Conference on Computer and Communications Security

DOI

ISSN

1543-7221

Publication Date

January 1, 2004

Start / End Page

227 / 235