A comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets
This paper presents a comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets through simulation. Mix-servers involved in a decryption mixnet receive independently and repeatedly encrypted messages as their input, then successively decrypt and shuffle them to ge...
Gespeichert in:
| Veröffentlicht in: | 2015 International Conference on Networking Systems and Security (NSysS) S. 1 - 5 |
|---|---|
| Hauptverfasser: | , , , |
| Format: | Tagungsbericht |
| Sprache: | Englisch Japanisch |
| Veröffentlicht: |
IEEE
01.01.2015
|
| Schlagworte: | |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | This paper presents a comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets through simulation. Mix-servers involved in a decryption mixnet receive independently and repeatedly encrypted messages as their input, then successively decrypt and shuffle them to generate a new altered output from which finally the messages are regained. Thus mixnets confirm unlinkability and anonymity between senders and the receiver of messages. Both symmetric (e.g. onetime pad, AES) and asymmetric (e.g. RSA and ElGamal cryptosystems) key encryption algorithms can be exploited to accomplish decryption mixnets. This paper evaluates both symmetric (e.g. ESEBM: enhanced symmetric key encryption based mixnet) and asymmetric (e.g. RSA and ElGamal based) key encryption algorithm based decryption mixnets. Here they are evaluated based on several criteria such as: the number of messages traversing through the mixnet, the number of mix-servers involved in the mixnet and the key length of the underlying cryptosystem. Finally mixnets are compared on the basis of the computation time requirement for the above mentioned criteria while sending messages anonymously. |
|---|---|
| AbstractList | This paper presents a comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets through simulation. Mix-servers involved in a decryption mixnet receive independently and repeatedly encrypted messages as their input, then successively decrypt and shuffle them to generate a new altered output from which finally the messages are regained. Thus mixnets confirm unlinkability and anonymity between senders and the receiver of messages. Both symmetric (e.g. onetime pad, AES) and asymmetric (e.g. RSA and ElGamal cryptosystems) key encryption algorithms can be exploited to accomplish decryption mixnets. This paper evaluates both symmetric (e.g. ESEBM: enhanced symmetric key encryption based mixnet) and asymmetric (e.g. RSA and ElGamal based) key encryption algorithm based decryption mixnets. Here they are evaluated based on several criteria such as: the number of messages traversing through the mixnet, the number of mix-servers involved in the mixnet and the key length of the underlying cryptosystem. Finally mixnets are compared on the basis of the computation time requirement for the above mentioned criteria while sending messages anonymously. |
| Author | Rahman, Habibur Ahmad, Sahan Tamura, Shinsuke Alam, Kazi Md Rokibul |
| Author_xml | – sequence: 1 givenname: Sahan surname: Ahmad fullname: Ahmad, Sahan email: sahan.ahmad@gmail.com organization: Dept. of Comput. Sci. & Eng., Khulna Univ. of Eng. & Technol., Khulna, Bangladesh – sequence: 2 givenname: Kazi Md Rokibul surname: Alam fullname: Alam, Kazi Md Rokibul email: rokibcse@yahoo.com organization: Dept. of Comput. Sci. & Eng., Khulna Univ. of Eng. & Technol., Khulna, Bangladesh – sequence: 3 givenname: Habibur surname: Rahman fullname: Rahman, Habibur email: habib090722@gmail.com organization: Dept. of Comput. Sci. & Eng., Khulna Univ. of Eng. & Technol., Khulna, Bangladesh – sequence: 4 givenname: Shinsuke surname: Tamura fullname: Tamura, Shinsuke email: tamura@dance.plala.or.jp organization: Grad. Sch. of Eng., Univ. of Fukui, Fukui, Japan |
| BookMark | eNpFj01LAzEYhCPoQWv_gF7yB3bNm-w2ybEUPwpFD9Xzko93Ndhkl2RB999bsOhpmHmGgbki52lISMgNsBqA6bvn_Vz2NWfQ1pI1ohX8jCy1VNBIrRXwll2Sbk3dEEeTQxkStTh9ISZa5hhxysFRkzw1__YTZ4rJ5XmcwrFvDu9DDtNHpNYU9NTjH4rhO-FUrslFbw4FlyddkLeH-9fNU7V7edxu1rsqcFBTJZXz0iruGg8t9wCgvZVOON84pziY1crJ1gvmlEahLNcMrJCq571W_BgtyO3vbkDEbswhmjx3p9viB2zOU_Y |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/NSysS.2015.7043532 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE/IET Electronic Library IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| EISBN | 9781479981250 1479981265 1479981257 9781479981267 |
| EndPage | 5 |
| ExternalDocumentID | 7043532 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IL CBEJK RIE RIL |
| ID | FETCH-LOGICAL-i218t-78cd7b82c4d152d1119db7c3cd4cc821a66c75d30c89e38b2901b378f2f9829e3 |
| IEDL.DBID | RIE |
| IngestDate | Thu Jun 29 18:38:05 EDT 2023 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English Japanese |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i218t-78cd7b82c4d152d1119db7c3cd4cc821a66c75d30c89e38b2901b378f2f9829e3 |
| PageCount | 5 |
| ParticipantIDs | ieee_primary_7043532 |
| PublicationCentury | 2000 |
| PublicationDate | 20150101 |
| PublicationDateYYYYMMDD | 2015-01-01 |
| PublicationDate_xml | – month: 01 year: 2015 text: 20150101 day: 01 |
| PublicationDecade | 2010 |
| PublicationTitle | 2015 International Conference on Networking Systems and Security (NSysS) |
| PublicationTitleAbbrev | NSysS |
| PublicationYear | 2015 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| Score | 1.7015864 |
| Snippet | This paper presents a comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets through simulation. Mix-servers involved in... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 1 |
| SubjectTerms | Algorithm design and analysis Anonymity ElGamal Encryption Generators Mixnet Privacy Protocol Public key Receivers RSA Servers Symmetric key encryption algorithm |
| Title | A comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets |
| URI | https://ieeexplore.ieee.org/document/7043532 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3NS8MwFA9zePCksonf5ODR7iPdmuQo4vBUBlPYbSTvJVqwrbTdcP-9SVc7BC_ekpeQwAt5v5fkvfwIuUPJpzgFEQihI3dAkWGgNcPAcDlmFmyEBmuyCR7HYrmU8w65b3NhjDF18JkZ-GL9lo85rP1V2ZCPHLiHzuAecB7tcrV-8mBGchgvtuXCB2tNB03HX4wpNWDMjv831Qnp7zPv6LzFlFPSMVmPrB4otHSBtImsouU2TT0dFlCVIVX7qtuW1A1UbGtrQNXHW14k1XtKPWIhRdM2pclXZqqyT15nTy-Pz0FDjBAkDpGrgAtArgWDCTr4RWeuJGoOIeAEQLCxiiJwSxCOQEgTCu3fSnXIhWVWCuZEZ6Sb5Zk5J9T_d6-ENhatmnAWaaG4c4ksgHWuHpMXpOeVs_rc_X2xavRy-bf4ihx5_e-uKK5JtyrW5oYcwqZKyuK2XrBv1F2ckA |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3NS8MwFA9jCnpS2cRvc_Boty79SHIUcUycZbAJu5XmJdGC7WTtxP33Jl3tELx4yxcJ5JH3e0neez-EbiSngQyAOYyJ0FxQuOcIQaSjKB8QDTqUSlZkEzSK2HzOJy1028TCKKUq5zPVs8XqL18uYGWfyvrUNeDuGYW7E_g-cTfRWj-RMC7vR9N1MbXuWkGvHvqLM6WCjOHB_xY7RN1t7B2eNKhyhFoq76D4DkNDGIhr3ypcrLPMEmIBTnKJk23VHExsJlquK32Ak_fXxTIt3zJsMUtiqZquLP3KVVl00cvwYXY_cmpqBCc1mFw6lIGkghHwpQFgaRQWl4KCB9IHYGSQhCEYIXguMK48JuxvqfAo00RzRkzTMWrni1ydIGwz3idMKC114lMSCpZQYxRpAG2MPcJPUcduTvyxyX4R1_ty9nfzNdobzZ7H8fgxejpH-1YWmweLC9Qulyt1iXbhs0yL5VUlvG8kNZ_X |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2015+International+Conference+on+Networking+Systems+and+Security+%28NSysS%29&rft.atitle=A+comparison+between+symmetric+and+asymmetric+key+encryption+algorithm+based+decryption+mixnets&rft.au=Ahmad%2C+Sahan&rft.au=Alam%2C+Kazi+Md+Rokibul&rft.au=Rahman%2C+Habibur&rft.au=Tamura%2C+Shinsuke&rft.date=2015-01-01&rft.pub=IEEE&rft.spage=1&rft.epage=5&rft_id=info:doi/10.1109%2FNSysS.2015.7043532&rft.externalDocID=7043532 |