Cryptology ePrint Archive: Report 2016/729

Attacks on cMix - Some Small Overlooked Details

Herman Galteland and Stig F. Mj°lsnes and Ruxandra F. Olimid

Abstract: Chaum et al. have very recently introduced cMix as the first practical system that offers senders-recipients unlinkability at scale. cMix is claimed by its authors to be secure unless all nodes collude. We argue their assertion does not hold for the basic description of the protocol and sustain our statement by two different types of attacks: tagging attack and insider attack. For each one, we discuss the settings that make it feasible and possible countermeasures. By this, we highlight the necessity of implementing additional mechanisms that at first have been overlooked or have only been mentioned as additional features.

Category / Keywords: cryptographic protocols, sender-recipient unlinkability, anonymity, mixnets, attacks

Date: received 25 Jul 2016, last revised 24 Aug 2016

Contact author: ruxandra olimid at ntnu no

Available format(s): PDF | BibTeX Citation

Version: 20160824:134718 (All versions of this report)

Short URL: ia.cr/2016/729

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]