J4
• Original Articles • Previous Articles Next Articles
LI Long-hai1,2;FU Shao-feng1;XIAO Guo-zhen2
Received:
Revised:
Online:
Published:
Abstract: We analysed Gao et al.’s (t, N-2)-resilient Mix Net scheme and found some serious security flaws in their design. In order to break Mix Net’s privacy, an active attacker can construct a list of ciphertexts with some relativity by utilizing the malleability of the ElGamal encryption scheme, and then observe the corresponding relativity of plaintexts to get the relationship between input and output elements. The malicious servers from two different groups can initiate collusion attacks proposed by this paper to make the Mix Net system output wrong and cheat the verifying protocol with non-negligible probability of success. The result of analysis shows that Gao et al.’s scheme does not satisfy (t, N-2)-resilience and that the electronic voting application based on their Mix Net is also insecure.
Key words: anonymous communication, Mix Net, collusion attacks
CLC Number:
LI Long-hai1;2;FU Shao-feng1;XIAO Guo-zhen2. Cryptanalysis of a (t, N-2)-resilient Mix Net [J].J4, 2007, 34(6): 926-929.
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://journal.xidian.edu.cn/xdxb/EN/
https://journal.xidian.edu.cn/xdxb/EN/Y2007/V34/I6/926
Cited