首页> 外文会议>International Conference on Cryptology and Malicious Security >Attacks on the Basic cMix Design: On the Necessity of Commitments and Randomized Partial Checking
【24h】

Attacks on the Basic cMix Design: On the Necessity of Commitments and Randomized Partial Checking

机译:对基本CMIX设计的攻击:关于承诺和随机部分检查的必要性

获取原文

摘要

The cMix scheme was proposed by Chaum et al. in 2016 as the first practical set of cryptographic protocols that offer sender-recipient unlinkability at scale. The claim was that the cMix is secure unless all nodes collude. We argue that their assertion does not hold for the basic description of cMix, and we sustain our statement by two different types of attacks: a tagging attack and an insider attack. For each one, we discuss the settings that make the attack feasible, and then possible countermeasures. By this, we highlight the necessity of implementing additional commitments or mechanisms that have only been mentioned as additional features.
机译:CMIX方案由Chaum等人提出。 2016年,作为第一个实用的加密协议,可在规模上提供发件人 - 收件人的解释性。索赔是CMIX是安全的,除非所有节点都融合。我们认为,他们的断言不会掌握CMIX的基本描述,我们通过两种不同类型的攻击维持我们的发言:标记攻击和内幕攻击。对于每个人,我们讨论使攻击可行的设置,然后进行对策。由此,我们突出了实现额外承诺或机制的必要性,这些承诺或机制只被提到了额外的功能。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号