We identify serious issues in the original description of mix-nets with RPC and show how to exploit these to break both correctness and privacy, both for Chaumian and homomorphic mix-nets. Our attacks are practical and applicable to real world mix-net implementations, e.g., the Civitas and the Scantegrity voting systems.
Category / Keywords: cryptographic protocols / mix-net, election schemes Date: received 13 Feb 2012 Contact author: dog at csc kth se Available formats: PDF | BibTeX Citation Note: If you know of additional implementations that are vulnerable, then please let us know about it. Version: 20120214:170443 (All versions of this report) Discussion forum: Show discussion | Start new discussion