Skip to main content

Fault tolerant anonymous channel

  • Session 15: Protocols
  • Conference paper
  • First Online:
Information and Communications Security (ICICS 1997)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1334))

Included in the following conference series:

Abstract

Previous anonymous channels, called MIX nets, do not work if one center stops. This paper shows new anonymous channels which allow less than a half of faulty centers. A fault tolerant multivalued election scheme is obtained automatically. A very efficient ZKIP for the centers is also presented.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. J. Benaloh, Secret sharing homomorphisms: Keeping a secret secret, in: Proc. of Eurocrypt'86, 251–260 (1986).

    Google Scholar 

  2. J.D. Cohen and M.J. Fischer, A Robust and Verifiable Cryptographically Secure Election Scheme, in: Proc. of 26th IEEE Symp. on Foundations of Computer Science, 372–382 (1985).

    Google Scholar 

  3. D.L. Chaum, Untraceable Electronic Mail, Return Address, and Digital Pseudonyms, in: Communications of the ACM,Vol. 24, No. 2, 84–88 (1981).

    Article  Google Scholar 

  4. P. Feldman, A Practical Scheme for Non-Interactive Verifiable Secret Sharing, in: Proc. of 28th IEEE symposium on Foundations of Computer Science, 427–437 (1987).

    Google Scholar 

  5. M. Michels and P. Horster, Some Remarks on a Receipt-Free and Universally Verifiable Mix-Type Voting Scheme, in: Proc. of Asiacrypt '96, 125–132 (1996).

    Google Scholar 

  6. B. Pfitzmann, Breaking an Efficient Anonymous Channel, in: Proc. of Eurocrypt '94, 339–348 (1994).

    Google Scholar 

  7. C. Park, K. Itoh and K. Kurosawa, All/Nothing Election Scheme and Anonymous Channel, in: Proc. of Eurocrypt '93, (1993).

    Google Scholar 

  8. B. Pfitzmann and A. Pfitzmann, How to Break the Direct RSA-implementation of Mixes, in: Proc. of Eurocrypt '89, 373–381 (1989).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Yongfei Han Tatsuaki Okamoto Sihan Qing

Rights and permissions

Reprints and permissions

Copyright information

© 1997 Springer-Verlag

About this paper

Cite this paper

Ogata, W., Kurosawa, K., Sako, K., Takatani, K. (1997). Fault tolerant anonymous channel. In: Han, Y., Okamoto, T., Qing, S. (eds) Information and Communications Security. ICICS 1997. Lecture Notes in Computer Science, vol 1334. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0028500

Download citation

  • DOI: https://doi.org/10.1007/BFb0028500

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-63696-0

  • Online ISBN: 978-3-540-69628-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics