A comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets

This paper presents a comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets through simulation. Mix-servers involved in a decryption mixnet receive independently and repeatedly encrypted messages as their input, then successively decrypt and shuffle them to ge...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:2015 International Conference on Networking Systems and Security (NSysS) s. 1 - 5
Hlavní autori: Ahmad, Sahan, Alam, Kazi Md Rokibul, Rahman, Habibur, Tamura, Shinsuke
Médium: Konferenčný príspevok..
Jazyk:English
Japanese
Vydavateľské údaje: IEEE 01.01.2015
Predmet:
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract This paper presents a comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets through simulation. Mix-servers involved in a decryption mixnet receive independently and repeatedly encrypted messages as their input, then successively decrypt and shuffle them to generate a new altered output from which finally the messages are regained. Thus mixnets confirm unlinkability and anonymity between senders and the receiver of messages. Both symmetric (e.g. onetime pad, AES) and asymmetric (e.g. RSA and ElGamal cryptosystems) key encryption algorithms can be exploited to accomplish decryption mixnets. This paper evaluates both symmetric (e.g. ESEBM: enhanced symmetric key encryption based mixnet) and asymmetric (e.g. RSA and ElGamal based) key encryption algorithm based decryption mixnets. Here they are evaluated based on several criteria such as: the number of messages traversing through the mixnet, the number of mix-servers involved in the mixnet and the key length of the underlying cryptosystem. Finally mixnets are compared on the basis of the computation time requirement for the above mentioned criteria while sending messages anonymously.
AbstractList This paper presents a comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets through simulation. Mix-servers involved in a decryption mixnet receive independently and repeatedly encrypted messages as their input, then successively decrypt and shuffle them to generate a new altered output from which finally the messages are regained. Thus mixnets confirm unlinkability and anonymity between senders and the receiver of messages. Both symmetric (e.g. onetime pad, AES) and asymmetric (e.g. RSA and ElGamal cryptosystems) key encryption algorithms can be exploited to accomplish decryption mixnets. This paper evaluates both symmetric (e.g. ESEBM: enhanced symmetric key encryption based mixnet) and asymmetric (e.g. RSA and ElGamal based) key encryption algorithm based decryption mixnets. Here they are evaluated based on several criteria such as: the number of messages traversing through the mixnet, the number of mix-servers involved in the mixnet and the key length of the underlying cryptosystem. Finally mixnets are compared on the basis of the computation time requirement for the above mentioned criteria while sending messages anonymously.
Author Rahman, Habibur
Ahmad, Sahan
Tamura, Shinsuke
Alam, Kazi Md Rokibul
Author_xml – sequence: 1
  givenname: Sahan
  surname: Ahmad
  fullname: Ahmad, Sahan
  email: sahan.ahmad@gmail.com
  organization: Dept. of Comput. Sci. & Eng., Khulna Univ. of Eng. & Technol., Khulna, Bangladesh
– sequence: 2
  givenname: Kazi Md Rokibul
  surname: Alam
  fullname: Alam, Kazi Md Rokibul
  email: rokibcse@yahoo.com
  organization: Dept. of Comput. Sci. & Eng., Khulna Univ. of Eng. & Technol., Khulna, Bangladesh
– sequence: 3
  givenname: Habibur
  surname: Rahman
  fullname: Rahman, Habibur
  email: habib090722@gmail.com
  organization: Dept. of Comput. Sci. & Eng., Khulna Univ. of Eng. & Technol., Khulna, Bangladesh
– sequence: 4
  givenname: Shinsuke
  surname: Tamura
  fullname: Tamura, Shinsuke
  email: tamura@dance.plala.or.jp
  organization: Grad. Sch. of Eng., Univ. of Fukui, Fukui, Japan
BookMark eNpFj01LAzEYhCPoQWv_gF7yB3bNm-w2ybEUPwpFD9Xzko93Ndhkl2RB999bsOhpmHmGgbki52lISMgNsBqA6bvn_Vz2NWfQ1pI1ohX8jCy1VNBIrRXwll2Sbk3dEEeTQxkStTh9ISZa5hhxysFRkzw1__YTZ4rJ5XmcwrFvDu9DDtNHpNYU9NTjH4rhO-FUrslFbw4FlyddkLeH-9fNU7V7edxu1rsqcFBTJZXz0iruGg8t9wCgvZVOON84pziY1crJ1gvmlEahLNcMrJCq571W_BgtyO3vbkDEbswhmjx3p9viB2zOU_Y
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/NSysS.2015.7043532
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9781479981250
1479981265
1479981257
9781479981267
EndPage 5
ExternalDocumentID 7043532
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i218t-78cd7b82c4d152d1119db7c3cd4cc821a66c75d30c89e38b2901b378f2f9829e3
IEDL.DBID RIE
IngestDate Thu Jun 29 18:38:05 EDT 2023
IsPeerReviewed false
IsScholarly false
Language English
Japanese
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i218t-78cd7b82c4d152d1119db7c3cd4cc821a66c75d30c89e38b2901b378f2f9829e3
PageCount 5
ParticipantIDs ieee_primary_7043532
PublicationCentury 2000
PublicationDate 20150101
PublicationDateYYYYMMDD 2015-01-01
PublicationDate_xml – month: 01
  year: 2015
  text: 20150101
  day: 01
PublicationDecade 2010
PublicationTitle 2015 International Conference on Networking Systems and Security (NSysS)
PublicationTitleAbbrev NSysS
PublicationYear 2015
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.7016795
Snippet This paper presents a comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets through simulation. Mix-servers involved in...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Algorithm design and analysis
Anonymity
ElGamal
Encryption
Generators
Mixnet
Privacy
Protocol
Public key
Receivers
RSA
Servers
Symmetric key encryption algorithm
Title A comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets
URI https://ieeexplore.ieee.org/document/7043532
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEB5q8eBJpRXf5ODRbbf7SLJHEYsHKYUq9FaSSaoL7lZ2t2L_vZPtukXw4i3JhAlMkvnymAfADYZKmFiNPIxdUG2ruCd5rL14ZCJtfUVLog7i-iQmEzmfJ9MO3La-MNba2vjMDlyx_ss3K1y7p7Kh8AncQ1K4e0Lwra_Wjx-Mnwwns005c8Za8aDp-CtjSg0Y48P_DXUE_Z3nHZu2mHIMHZv3YHHHsE0XyBrLKlZussylw0KmcsPUrkrbkhGjYlNrA6beX1dFWr1lzCGWYca2pCz9ym1V9uFl_PB8_-g1iRG8lBC58oREI7QMMDIEv4bUVWK0wBBNhCiDkeIcRWxCH2ViQ6ndX6kOhVwGy0QG1HQC3XyV21NgSnE6gOGSLi48Irr2LRV4RDwknXTwDHpOOIuPbeyLRSOX87-bL-DAyX_7RHEJ3apY2yvYx88qLYvresK-AapLm3U
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3NS8MwFA9jCnpS2cRvc_Bot65fSY8ijomzDDZht5K8ZFqwnbSduP_el652CF685YsXeEneL3l5H4TcgCuY8sXAAt8E1dYisHjgS8sfKE9qW-CWqIK4jlkU8fk8nLTIbeMLo7WujM90zxSrv3y1hJVRlfWZjeDuosDd8T3PsTfeWj-eMHbYj6brYmrMtfxePfRXzpQKMoYH_5vskHS3vnd00qDKEWnprEPiOwpNwkBa21bRYp2mJiEWUJEpKrZVPJgUCeXrSh5Q8f66zJPyLaUGsxRVuulKk69Ml0WXvAwfZvcjq06NYCWIyaXFOCgmuQOeQgBWKLBCJRm4oDwA7gxEEADzlWsDD7XLpfktlS7jC2cRcgebjkk7W2b6hFAhAryCwQKfLoGH_dLWWAg8pMHxrgOnpGOYE39sol_ENV_O_m6-Jnuj2fM4Hj9GT-dk36zFRmFxQdplvtKXZBc-y6TIr6rF-wbr2p68
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2015+International+Conference+on+Networking+Systems+and+Security+%28NSysS%29&rft.atitle=A+comparison+between+symmetric+and+asymmetric+key+encryption+algorithm+based+decryption+mixnets&rft.au=Ahmad%2C+Sahan&rft.au=Alam%2C+Kazi+Md+Rokibul&rft.au=Rahman%2C+Habibur&rft.au=Tamura%2C+Shinsuke&rft.date=2015-01-01&rft.pub=IEEE&rft.spage=1&rft.epage=5&rft_id=info:doi/10.1109%2FNSysS.2015.7043532&rft.externalDocID=7043532