Anonymous Broadcast Messages
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2013, Vol 4, Issue 12
Abstract
The Dining Cryptographer network (or DC-net) is a privacy preserving communication protocol devised by David Chaum for anonymous message publication. A very attractive feature of DC-nets is the strength of its security, which is inherent in the protocol and is not dependent on other schemes, like encryption. Unfortunately the DC-net protocol has a level of complexity that causes it to suffer from exceptional communication overhead and implementation difficulty that precludes its use in many real-world use-cases. We have designed and created a DC-net implementation that uses a pure client-server model, which successfully avoids much of the complexity inherent in the DC-net protocol. We describe the theory of DC-nets and our pure client-server implementation, as well as the compromises that were made to reduce the protocol’s level of complexity. Discussion centers around the details of our implementation of DC-net.
Authors and Affiliations
Dragan Lazic, Charlie Obimbo
Accident Detection and Smart Rescue System using Android Smartphone with Real-Time Location Tracking
A large number of deaths are caused by Traffic accidents worldwide. The global crisis of road safety can be seen by observing the significant number of deaths and injuries that are caused by road traffic accidents. In ma...
Secret Key Agreement Over Multipath Channels Exploiting a Variable-Directional Antenna
We develop an approach of key distribution protocol(KDP) proposed recently by T.Aono et al., where the security of KDP is only partly estimated in terms of eavesdropper's key bit errors. Instead we calculate the S...
RTS/CTS Framework Paradigm and WLAN Qos Provisioning Methods
Wireless local area network (WLAN) communications performance design and management have evolved a lot to be where they are today. They went through some technology’s amendments and innovations. But, some performance too...
A New Approach of Graph Realization for Data Hiding using Human Encoding
The rapid advancement of technology has changed the way of our living. Sharing information becomes inevitable in everyday life. However, it encounters many security issues when dealing with secret or private information....
A Fuzzy Similarity Based Concept Mining Model for Text Classification
Text Classification is a challenging and a red hot field in the current scenario and has great importance in text categorization applications. A lot of research work has been done in this field but there is a need to cat...