Please use this identifier to cite or link to this item: http://hdl.handle.net/20.500.12188/23940
DC FieldValueLanguage
dc.contributor.authorRibarski, Pancheen_US
dc.contributor.authorAntovski, Ljupchoen_US
dc.date.accessioned2022-10-31T08:29:03Z-
dc.date.available2022-10-31T08:29:03Z-
dc.date.issued2012-09-30-
dc.identifier.urihttp://hdl.handle.net/20.500.12188/23940-
dc.description.abstractThe anonymous channels have been the essence of numerous protocols that include anonymous message passing between peers. The mixnet structure is one way to accomplish the anonymity . Since the publication of the Chaumian mixnet, there have been many practical implementations. There are two main approaches to implement mixnets: the decryption (Chaumian) and the re-encryption mixnets. In this paper we analyze four types of mixnets, of which one decryption and three re-encryption types. They were implemented in the Java programing language and evaluated on several criterias as: the number of messages, the total number of nodes, the number of threshold nodes, and the key length of underlying crypto system. In the results section we compare the results from the practical tests to answer the research question, which type of mixnets has better features.en_US
dc.publisherFakultet elektrotehnike i računarstva Sveučilišta u Zagrebuen_US
dc.relation.ispartofJournal of computing and information technologyen_US
dc.subjectmixnets, decryption, re-encryption, e-voting, algorithms, performance, ElGamal, threshold, dealeren_US
dc.titleMixnets: Implementation and performance evaluation of decryption and re-encryption typesen_US
dc.typeArticleen_US
item.fulltextWith Fulltext-
item.grantfulltextopen-
crisitem.author.deptFaculty of Computer Science and Engineering-
Appears in Collections:Faculty of Computer Science and Engineering: Journal Articles
Files in This Item:
File Description SizeFormat 
CIT2101.PDF211.81 kBAdobe PDFView/Open
Show simple item record

Page view(s)

35
checked on Oct 7, 2024

Download(s)

8
checked on Oct 7, 2024

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.