It is not difficult to imagine scenarios in which message secrecy in communication is desirable. In such scenarios, encryption is a crucial tool. Unfortunately, encryption of message contents by itself may not be sufficient. Even if the contents of sensitive messages are protected, much can be inferred merely by the fact that one party is sending a message to another party. If an authoritarian regime already suspects that one party to a communication is a dissident, then the other parties to the communication become suspect as well. Accessing a crisis hotline or a patent database is a strong clue about the intentions of the user, even if the exact wording of the query remains secret. In settings where encryption is rare, the mere fact that certain messages are encrypted may cause increased scrutiny.
In 1981, Chaum [3] published a beautifully simple and elegant method to protect the identities of communicating parties: “mix networks.” The basic functionality of a mix network is to...
References
Back, A., U. Moller, and A. Stiglic (2001). “Traffic analysis and trade-offs in anonymity providing systems.” Proceedings of the 4th Information Hiding Workshop, Lecture Notes in Computer Science, vol. 2137, ed. I.S. Moskowitz. Springer-Verlag, Berlin, 243–254.
Boucher, P., A. Shostack, and I. Goldberg (2000). Freedom 2.0 System Architecture. Zero Knowledge Systems (white paper).
Chaum, D. (1981). “Untraceable electronic mail, return addresses, and digital pseudonyms.” CACM, 24 (2), 84–88.
Fujioka, A., T. Okamoto, and K. Ohta (1992). “A practical secret voting scheme for large scale elections.” Advances in Cryptology—AUSCRYPT'92, Lecture Notes in Computer Science, vol. 718, eds. J. Seberry and Y. Zheng, Gold Coast, Queensland, Australia. Springer-Verlag, Berlin, 244–251.
Goldschlag, D., M. Reed, and P. Syverson (1999). “Onion routing.” CACM, 42 (2), 39–41.
Gulcu, C. and G. Tsudik (1996). “Mixing e-mail with BABEL.” Proceedings of Symposium on Network and Distributed System Security. IEEE Computer Society.
Jakobsson, M., A. Juels, and R. Rivest (2002). “Making mix nets robust for electronic voting by partial checking.” Proc. USENIX Security.
Park, C., K. Itoh, and K. Kurosawa (1993). “Efficient anonymous channel and all/nothing election scheme.” Advances in Cryptology—EUROCRYPT'93, Lecture Notes in Computer Science, vol. 765, ed. T. Helleseth. Springer-Verlag, Berlin, 248–259.
Reiter, M. and A. Rubin (1998). “Crowds: Anonymity for web transactions.” ACM Transactions on Information and System Security, 1 (1), 66–92.
Sako, K. and J. Kilian (1995). “Receipt-free mix-type voting scheme—a practical solution to the implementation of a voting booth.” Advances in Cryptology—EUROCRYPT'95, Lecture Notes in Computer Science, vol. 021, eds. L. Guillou and J.-J. Quisquater. Springer-Verlag, Berlin, 393–403.
Serjantov, A., R. Dingledine, and P. Syverson (2002). “From a trickle to a flood: Active attacks on several mix types.” Proceedings of Information Hiding Workshop, Lecture Notes in Computer Science, vol. 2578, ed. F.A.P. Petitcolas. Springer-Verlag, Berlin, 36–52.
Wright, M., M. Adler, B. Levine, and C. Schields (2002). “An analysis of the degradation of anonymous protocols.” Proceedings of Symposium on Network and Distributed System Security (NDSS).
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 International Federation for Information Processing
About this entry
Cite this entry
Franklin, M.K. (2005). Mix Networks. In: van Tilborg, H.C.A. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA . https://doi.org/10.1007/0-387-23483-7_257
Download citation
DOI: https://doi.org/10.1007/0-387-23483-7_257
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-23473-1
Online ISBN: 978-0-387-23483-0
eBook Packages: Computer ScienceReference Module Computer Science and Engineering