J4

• Original Articles • Previous Articles     Next Articles

Cryptanalysis of a (t, N-2)-resilient Mix Net

LI Long-hai1,2;FU Shao-feng1;XIAO Guo-zhen2
  

  1. (1. School of Computer Science and Technology, Xidian Univ., Xi′an 710071, China;2. State Key Lab. of Integrated Service Networks, Xidian Univ., Xi′an 710071, China)
  • Received:1900-01-01 Revised:1900-01-01 Online:2007-12-20 Published:2007-12-20

Abstract: We analysed Gao et al.’s (t, N-2)-resilient Mix Net scheme and found some serious security flaws in their design. In order to break Mix Net’s privacy, an active attacker can construct a list of ciphertexts with some relativity by utilizing the malleability of the ElGamal encryption scheme, and then observe the corresponding relativity of plaintexts to get the relationship between input and output elements. The malicious servers from two different groups can initiate collusion attacks proposed by this paper to make the Mix Net system output wrong and cheat the verifying protocol with non-negligible probability of success. The result of analysis shows that Gao et al.’s scheme does not satisfy (t, N-2)-resilience and that the electronic voting application based on their Mix Net is also insecure.

Key words: anonymous communication, Mix Net, collusion attacks

CLC Number: 

  • TN918