{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:29:20Z","timestamp":1725470960509},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540383413"},{"type":"electronic","value":"9783540383437"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11836810_4","type":"book-chapter","created":{"date-parts":[[2006,10,3]],"date-time":"2006-10-03T10:36:57Z","timestamp":1159871817000},"page":"46-59","source":"Crossref","is-referenced-by-count":13,"title":["Breaking Four Mix-Related Schemes Based on Universal Re-encryption"],"prefix":"10.1007","author":[{"given":"George","family":"Danezis","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"4_CR1","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. Chaum","year":"1981","unstructured":"Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM\u00a024(2), 84\u201388 (1981)","journal-title":"Commun. ACM"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Danezis, G., Dingledine, R., Mathewson, N.: Mixminion: Design of a Type III Anonymous Remailer Protocol. In: IEEE Symposium on Security and Privacy, Berkeley, CA, May 11-14 (2003)","DOI":"10.1109\/SECPRI.2003.1199323"},{"key":"4_CR3","unstructured":"Moeller, U., Cottrell, L., Palfrader, P., Sassaman, L.: Mixmaster protocol version 2. Technical report, Network Working Group (May 25, 2004), Internet-Draft"},{"key":"4_CR4","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/NDSS.1996.492350","volume-title":"Network and Distributed Security Symposium \u2014 NDSS 1996","author":"C. G\u00fclc\u00fc","year":"1996","unstructured":"G\u00fclc\u00fc, C., Tsudik, G.: Mixing E-mail with Babel. In: Network and Distributed Security Symposium \u2014 NDSS 1996, San Diego, California, February 1996, pp. 2\u201316. IEEE, Los Alamitos (1996)"},{"key":"4_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1007\/3-540-48285-7_21","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"C. Park","year":"1994","unstructured":"Park, C., Itoh, K., Kurosawa, K.: Efficient anonymous channel and all\/nothing election scheme. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 248\u2013259. Springer, Heidelberg (1994)"},{"key":"4_CR6","first-page":"116","volume-title":"ACM Conference on Computer and Communications Security (CCS 2002)","author":"C. Andrew Neff","year":"2001","unstructured":"Andrew Neff, C.: A verifiable secret shuffle and its application to e-voting. In: Samarati, P. (ed.) ACM Conference on Computer and Communications Security (CCS 2002), November 2001, pp. 116\u2013125. ACM Press, New York (2001)"},{"issue":"4","key":"4_CR7","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. El Gamal","year":"1985","unstructured":"El Gamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory\u00a0IT-31(4), 469\u2013472 (1985)","journal-title":"IEEE Transactions on Information Theory"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Golle, P., Jakobsson, M., Juels, A., Syverson, P.: Universal re-encryption for mixnets. In: Proceedings of the 2004 RSA Conference, Cryptographer\u2019s track, San Francisco, USA (February 2004)","DOI":"10.1007\/978-3-540-24660-2_14"},{"key":"4_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/11423409_6","volume-title":"Privacy Enhancing Technologies","author":"P. Fairbrother","year":"2005","unstructured":"Fairbrother, P.: An improved construction for universal re-encryption. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol.\u00a03424, pp. 79\u201387. Springer, Heidelberg (2005)"},{"key":"4_CR10","unstructured":"Klonowski, M., Kutylowski, M., Lauks, A., Zagorski, F.: Universal re-encryption of signatures and controlling anonymous information flow. In: WARTACRYPT 2004 Conference on Cryptology, Bedlewo\/Poznan, July 1\u20133 (2004)"},{"key":"4_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/978-3-540-30577-4_26","volume-title":"SOFSEM 2005: Theory and Practice of Computer Science","author":"M. Klonowski","year":"2005","unstructured":"Klonowski, M., Kuty\u0142owski, M., Zag\u00f3rski, F.: Anonymous communication with on-line and off-line onion encoding. In: Vojt\u00e1\u0161, P., Bielikov\u00e1, M., Charron-Bost, B., S\u00fdkora, O. (eds.) SOFSEM 2005. LNCS, vol.\u00a03381, pp. 229\u2013238. Springer, Heidelberg (2005)"},{"key":"4_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1007\/978-3-540-31815-6_32","volume-title":"Information Security Applications","author":"M. Gomu\u0142kiewicz","year":"2005","unstructured":"Gomu\u0142kiewicz, M., Klonowski, M., Kuty\u0142owski, M.: Onions based on universal re-encryption \u2013 anonymous communication immune against repetitive attack. In: Lim, C.H., Yung, M. (eds.) WISA 2004. LNCS, vol.\u00a03325, pp. 400\u2013410. Springer, Heidelberg (2005)"},{"key":"4_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"853","DOI":"10.1007\/11534310_90","volume-title":"Networking and Mobile Computing","author":"T. Lu","year":"2005","unstructured":"Lu, T., Fang, B.X., Sun, Y., Guo, L.: Some remarks on universal re-encryption and A novel practical anonymous tunnel. In: Lu, X., Zhao, W. (eds.) ICCNMC 2005. LNCS, vol.\u00a03619, pp. 853\u2013862. Springer, Heidelberg (2005)"},{"issue":"2","key":"4_CR14","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/293411.293778","volume":"42","author":"M.K. Reiter","year":"1999","unstructured":"Reiter, M.K., Rubin, A.D.: Anonymous web transactions with crowds. Commun. ACM\u00a042(2), 32\u201338 (1999)","journal-title":"Commun. ACM"},{"issue":"2","key":"4_CR15","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM\u00a021(2), 120\u2013126 (1978)","journal-title":"Communications of the ACM"},{"key":"4_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1007\/BFb0053448","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"B. Pfitzmann","year":"1995","unstructured":"Pfitzmann, B.: Breaking an efficient anonymous channel. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 332\u2013340. Springer, Heidelberg (1995)"},{"issue":"4","key":"4_CR17","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1145\/1042031.1042032","volume":"7","author":"M. Wright","year":"2004","unstructured":"Wright, M., Adler, M., Levine, B.N., Shields, C.: The predecessor attack: An analysis of a threat to anonymous communications systems. ACM Trans. Inf. Syst. Secur.\u00a07(4), 489\u2013522 (2004)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"4_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","volume-title":"Peer-to-Peer Systems","author":"J.R. Douceur","year":"2002","unstructured":"Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol.\u00a02429, pp. 251\u2013260. Springer, Heidelberg (2002)"},{"key":"4_CR19","unstructured":"PKCS #1 v2.1: RSA Cryptography Standard. RSA Security Inc. (June 2002)"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11836810_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:14:44Z","timestamp":1619507684000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11836810_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540383413","9783540383437"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/11836810_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}