References
- L. von Ahn, A. Bortz and N. J. Hopper, 'k-anonymous message transmission', In Proc. of ACM CCS'03, PP122-130. ACM Press, 2003
- M. Bellare, A. Boldreva, A. Desai and D. Pointcheval. 'Key-privacy in public-key encryption'. In Proc. of ASIACRYPT '01, pp.566-582. LNCS 2248
- D. Chaum, The dining cryptographers problem : unconditional sender and recipient untraceability. In Journal of Cryptography, 1(1), pp.65-75, 1988
- D. Chaum, 'Untraceable Electronic Mail. Return Addresses, and Digital Pseudonyms'. Comm. ACM. Vol. 24, No.2, pp. 84-88, Feb. 1981 https://doi.org/10.1145/358549.358563
- C. Diaz and A. Serjantov, 'Generalising Mixes', In the Proceedings of the privacy Enhancing Technologies workshop(PET2003), March 2003
- R. Gennaro, S. Jarecki. H. Krawczyk and T. Rabin. 'Secure Distribution Key Generation for Discrete-Log Based Cryptosystems'. In Proc. of Eurocrypt'99, pp. 295-310. Springer-Verlag, 1999. LNCS 1592
- S.Goldwasser and S. Micali. 'Probabilistic encryption'. Jaurnal Computer and System Sciences, Vol. 28, pp.270-299, 1984 https://doi.org/10.1016/0022-0000(84)90070-9
- P. Golle, M. Jakobsson, A. Juels, and P. Syverson. 'Universal Re-Encryption for Mixnets'". In Proc. of the 2004 RSA Conference, Cryptographer's track, San Francisco, USA. February 2004
- P. Golle, M. Jakobsson. 'Reusable Anonymous Return Channels'. In Proc. of WPES '03, October 30, 2003, Washington, DC, USA
- P. Golle, A. Juels, 'Dining Cryptograpers Revisited'. In Proc. of Eurocrypt'04, LNCS 3027, pp 456-473, 2004
- K. Kurosawa. 'Multi-recipient Public-Key Encryption with Shortened Ciphertext'. PKC 2002, LNCS 2274, pp. 48-63, 2002
- B. Moller, 'Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes'. CT-RSA 2003, April 2003
- W. Ogata, K. Kurosawa, K. Sako and K. Takatan. 'Fault tolerant anonymous channel'. In Proc. of ICICS'97, pp. 440-444, 1997. LNCS 1334
- T. Pedersen. 'A Threshold cryptosystem without a trusted party.' In Proc. of Eurocrypt'91, pp.522-526, 1991
- A. Serjantov, R. Dingledine, and P. Syverson, 'From a Trickle to a Flood: Active Attacks on Several Mix Types', In the Proceedjngs of Information Hiding workshop, October 2002
- A. Serjantov, R. E. Newman, On the Anonymity of Timed Pool Mixes, In the Workshop on Privacy and Anonymity Issues in Networked and Distributed Systems, Athens, Greece, May 2003, pages 427-434
- M. Waidner, 'Unconditional sender and recitient untraceability in spite of active attacks', In Proc. of Eurocrypt'89, pp.302-319. LNCS 434
- M. Waidner and B. Pfitzmann, 'The Dining cryptographyers in the disc : Unconditional sender and recitient untraceability with computaionally secure serviceability', In Proc. of Eurocrypt'90
- B. Waters, E. Felten, and A. Sahai. 'Receiver Anonymity via Incomparable Public Key', In the Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS 2003), October 2003, pages 112-121