Mixnets: Implementation and Performance Evaluation of Decryption and Re-encryption Types
|
Title | Mixnets: Implementation and Performance Evaluation of Decryption and Re-encryption Types |
Authors | |
Abstract | The anonymous channels have been the essence of numerous protocols that include anonymous message passing between peers. The mixnet structure is one way to accomplish the anonymity . Since the publication of the Chaumian mixnet, there have been many practical implementations. There are two main approaches to implement mixnets: the decryption (Chaumian) and the re-encryption mixnets. In this paper we analyze four types of mixnets, from which one decryption and three re-encryption types. They were implemented in the Java programing language and evaluated on several criterias as: the number of messages, the total number of nodes, the number of threshold nodes, and the key length of underlying crypto system. In the results section we compare the results from the practical tests to answer the research question, which type of mixnets has better features. |
Publisher | University of Zagreb, University Computing Centre - SRCE |
Date | 2012-10-17 |
Source | Journal of Computing and Information Technology Vol 20, No 3 (2012): Special Issue: Selected Papers from ITI 2012 Conference |
Rights | CIT. Journal of Computing and Information Technology is an open access journal. Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the works authorship and initial publication in this journal. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journals published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access). |