{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,10]],"date-time":"2023-09-10T05:50:34Z","timestamp":1694325034027},"reference-count":16,"publisher":"Hindawi Limited","license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Mobile Information Systems"],"published-print":{"date-parts":[[2015]]},"abstract":"<jats:p>In 1981, David Chaum proposed a cryptographic primitive for privacy called<jats:italic>mix network<\/jats:italic>(Mixnet). A mixnet is cryptographic construction that establishes anonymous communication channel through a set of servers. In 2004, Golle et al. proposed a new cryptographic primitive called universal reencryption which takes the input as encrypted messages under the public key of the recipients not the public key of the universal mixnet. In Eurocrypt 2010, Gentry, Halevi, and Vaikunthanathan presented a cryptosystem which is an additive homomorphic and a multiplicative homomorphic for only one multiplication. In MIST 2013, Singh et al. presented a lattice based universal reencryption scheme under learning with error (LWE) assumption. In this paper, we have improved Singh et al.\u2019s scheme using Fairbrother\u2019s idea. LWE is a lattice hard problem for which till now there is no polynomial time quantum algorithm. Wiangsripanawan et al. proposed a protocol for location privacy in mobile system using universal reencryption whose security is reducible to Decision Diffie-Hellman assumption. Once quantum computer becomes a reality, universal reencryption can be broken in polynomial time by Shor\u2019s algorithm. In postquantum cryptography, our scheme can replace universal reencryption scheme used in Wiangsripanawan et al. scheme for location privacy in mobile system.<\/jats:p>","DOI":"10.1155\/2015\/963628","type":"journal-article","created":{"date-parts":[[2015,3,23]],"date-time":"2015-03-23T21:09:14Z","timestamp":1427144954000},"page":"1-9","source":"Crossref","is-referenced-by-count":2,"title":["Lattice Based Mix Network for Location Privacy in Mobile System"],"prefix":"10.1155","volume":"2015","author":[{"given":"Kunwar","family":"Singh","sequence":"first","affiliation":[{"name":"Computer Science and Engineering Department, NIT Trichy, Tiruchirappalli 620015, India"}]},{"given":"C. Pandu","family":"Rangan","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering Department, IIT Madras, Chennai 600036, India"}]},{"given":"A. K.","family":"Banerjee","sequence":"additional","affiliation":[{"name":"Mathematics Department, NIT Trichy, Tiruchirappalli 620015, India"}]}],"member":"98","reference":[{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24660-2_14"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539795293172"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_1"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/mprv.2003.1186725"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_26"},{"key":"9","series-title":"Lecture Notes in Computer Science","first-page":"79","volume-title":"An improved construction for universal re-encryption","volume":"3424","year":"2004"},{"key":"15","year":"2002"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-0897-7"},{"key":"22","series-title":"Lecture Series","year":"2011"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_28"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03356-8_35"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19074-2_21"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2006.889687"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/tit.1985.1057074"}],"container-title":["Mobile Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2015\/963628.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2015\/963628.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2015\/963628.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,7,27]],"date-time":"2016-07-27T19:04:45Z","timestamp":1469646285000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.hindawi.com\/journals\/misy\/2015\/963628\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"references-count":16,"alternative-id":["963628","963628"],"URL":"https:\/\/doi.org\/10.1155\/2015\/963628","relation":{},"ISSN":["1574-017X","1875-905X"],"issn-type":[{"value":"1574-017X","type":"print"},{"value":"1875-905X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]}}}