We identify serious issues in the original description of mix-nets with RPC and show how to exploit these to break both correctness and privacy, both for Chaumian and homomorphic mix-nets. Our attacks are practical and applicable to real world mix-net implementations, e.g., the Civitas and the Scantegrity voting systems.
Category / Keywords: cryptographic protocols / mix-net, election schemes Date: received 13 Feb 2012 Contact author: dog at csc kth se Available format(s): PDF | BibTeX Citation Note: If you know of additional implementations that are vulnerable, then please let us know about it. Version: 20120214:170443 (All versions of this report) Short URL: ia.cr/2012/063 Discussion forum: Show discussion | Start new discussion