Skip to main content
  • 142 Accesses

It is not difficult to imagine scenarios in which message secrecy in communication is desirable. In such scenarios, encryption is a crucial tool. Unfortunately, encryption of message contents by itself may not be sufficient. Even if the contents of sensitive messages are protected, much can be inferred merely by the fact that one party is sending a message to another party. If an authoritarian regime already suspects that one party to a communication is a dissident, then the other parties to the communication become suspect as well. Accessing a crisis hotline or a patent database is a strong clue about the intentions of the user, even if the exact wording of the query remains secret. In settings where encryption is rare, the mere fact that certain messages are encrypted may cause increased scrutiny.

In 1981, Chaum [3] published a beautifully simple and elegant method to protect the identities of communicating parties: “mix networks.” The basic functionality of a mix network is to...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Back, A., U. Moller, and A. Stiglic (2001). “Traffic analysis and trade-offs in anonymity providing systems.” Proceedings of the 4th Information Hiding Workshop, Lecture Notes in Computer Science, vol. 2137, ed. I.S. Moskowitz. Springer-Verlag, Berlin, 243–254.

    Google Scholar 

  2. Boucher, P., A. Shostack, and I. Goldberg (2000). Freedom 2.0 System Architecture. Zero Knowledge Systems (white paper).

    Google Scholar 

  3. Chaum, D. (1981). “Untraceable electronic mail, return addresses, and digital pseudonyms.” CACM, 24 (2), 84–88.

    Google Scholar 

  4. Fujioka, A., T. Okamoto, and K. Ohta (1992). “A practical secret voting scheme for large scale elections.” Advances in Cryptology—AUSCRYPT'92, Lecture Notes in Computer Science, vol. 718, eds. J. Seberry and Y. Zheng, Gold Coast, Queensland, Australia. Springer-Verlag, Berlin, 244–251.

    Google Scholar 

  5. Goldschlag, D., M. Reed, and P. Syverson (1999). “Onion routing.” CACM, 42 (2), 39–41.

    Google Scholar 

  6. Gulcu, C. and G. Tsudik (1996). “Mixing e-mail with BABEL.” Proceedings of Symposium on Network and Distributed System Security. IEEE Computer Society.

    Google Scholar 

  7. Jakobsson, M., A. Juels, and R. Rivest (2002). “Making mix nets robust for electronic voting by partial checking.” Proc. USENIX Security.

    Google Scholar 

  8. Park, C., K. Itoh, and K. Kurosawa (1993). “Efficient anonymous channel and all/nothing election scheme.” Advances in Cryptology—EUROCRYPT'93, Lecture Notes in Computer Science, vol. 765, ed. T. Helleseth. Springer-Verlag, Berlin, 248–259.

    Google Scholar 

  9. Reiter, M. and A. Rubin (1998). “Crowds: Anonymity for web transactions.” ACM Transactions on Information and System Security, 1 (1), 66–92.

    Article  Google Scholar 

  10. Sako, K. and J. Kilian (1995). “Receipt-free mix-type voting scheme—a practical solution to the implementation of a voting booth.” Advances in Cryptology—EUROCRYPT'95, Lecture Notes in Computer Science, vol. 021, eds. L. Guillou and J.-J. Quisquater. Springer-Verlag, Berlin, 393–403.

    Google Scholar 

  11. Serjantov, A., R. Dingledine, and P. Syverson (2002). “From a trickle to a flood: Active attacks on several mix types.” Proceedings of Information Hiding Workshop, Lecture Notes in Computer Science, vol. 2578, ed. F.A.P. Petitcolas. Springer-Verlag, Berlin, 36–52.

    Google Scholar 

  12. Wright, M., M. Adler, B. Levine, and C. Schields (2002). “An analysis of the degradation of anonymous protocols.” Proceedings of Symposium on Network and Distributed System Security (NDSS).

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 International Federation for Information Processing

About this entry

Cite this entry

Franklin, M.K. (2005). Mix Networks. In: van Tilborg, H.C.A. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA . https://doi.org/10.1007/0-387-23483-7_257

Download citation

Publish with us

Policies and ethics