Attack for Flash MIX. Mitomo, M. & Kurosawa, K. 2000.
Attack for Flash MIX [link]Paper  doi  abstract   bibtex   
AMIX net takes a list of ciphertexts (c 1,... , c N) and outputs a permuted list of the plaintexts (m 1,... ,m N) without revealing the relationship between (c 1,... , c N) and (m 1,... ,m N). This paper shows that the Jakobsson\textquoterights flash MIX of PODC\textquoteright99, which was believed to be the most efficient robust MIX net, is broken. The first MIX server can prevent computing the correct output with probability 1 in our attack. We also present a countermeasure for our attack.
@conference {mitkuro,
	title = {Attack for Flash MIX},
	booktitle = {Proceedings of ASIACRYPT 2000},
	year = {2000},
	publisher = {Springer-Verlag, LNCS 1976},
	organization = {Springer-Verlag, LNCS 1976},
	abstract = {AMIX net takes a list of ciphertexts (c 1,... , c N) and outputs a permuted list of the plaintexts (m 1,... ,m N) without revealing the relationship between (c 1,... , c N) and (m 1,... ,m N). This paper shows that the Jakobsson{\textquoteright}s flash MIX of PODC{\textquoteright}99, which was believed to be the most efficient robust MIX net, is broken. The first MIX server can prevent computing the correct output with probability 1 in our attack. We also present a countermeasure for our attack.},
	isbn = {3-540-41404-5},
	doi = {10.1007/3-540-44448-3_15},
	url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.20.6972},
	author = {Masashi Mitomo and Kaoru Kurosawa}
}

Downloads: 0