SlideShare a Scribd company logo
1 of 9
Download to read offline
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.1, January 2013

        HOW TO FIND A FIXED POINT IN SHUFFLE
                   EFFICIENTLY

                          Mikako Kageshima1 and ManabuOkamoto1
                    1
                        Kanagawa Institute of Technology, Kanagawa, Japan
                                manabu@nw.kanagawa-it.ac.jp


ABSTRACT
In electronic voting or whistle blowing, anonymity is necessary. Shuffling is a network security technique
that makes the information sender anonymous. We use the concept of shuffling in internet-based lotteries,
mental poker, E-commerce systems, and Mix-Net. However, if the shuffling is unjust, the anonymity,
privacy, or fairness may be compromised. In this paper, we propose the method for confirming fair
mixing by finding a fixed point in the mix system and we can keep the details on ‘how to shuffle’ secret.
This method requires only two steps and is efficient.

KEYWORDS
Network Security, Protocol, Privacy, Mix


1. INTRODUCTION
Mix-Net [1][2] is a key technique for maintaining anonymity and privacy in electronic
voting[3][4]. Mix-Net servers shuffle encrypted messages in order to maintain the privacy of
voters. Therefore, ‘how to shuffle’ is an important subject. However, thus far, ‘how to shuffle’
is in a black-box wherein it is not discussed whether the shuffle was mixed fairly.
We use the concept of shuffling in internet-based lotteries [5], mental poker [6], E-commerce
systems [7], and Mix-Net. However, if the shuffling is unjust, it is reflected on the outcome, and
the anonymity, privacy, or fairness may be compromised. In this study, we will propose a
method to confirm fair mixing of information. In order to confirm this condition, we will
attempt to find fixed points in the mix. If there are no fixed points in the mix, we can declare
that the mix was performed well and fairly.
A method to confirm fair mixing was proposed by us in [8]. However, this method required
many procedural steps to achieve the correct result. Additionally, the mix would not be fair if
these steps were performed only once; hence, the same steps had to be performed repeatedly.
This proved to be cumbersome.
In this study, we propose the complete method for confirming fair mixing by finding a fixed
point in the mix system and we can keep the details on ‘how to shuffle’ secret. This method
requires only two steps and is efficient. This method needs to be performed only once to get
correct results.

2. FAIR MIXING
Mix-Net [1] is a technique for maintaining privacy in electronic voting. Mix-Net is used for
making the identity of voters anonymous. Mix-Net servers shuffle information so that its users
become anonymous. Plural Mix-Net servers shuffle encrypted messages in order to maintain the
privacy of voters, and they are safe unless all servers conspire.


DOI : 10.5121/ijnsa.2013.5104                                                                          51
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.1, January 2013
How the shuffle is performed is the key to anonymity. If Mix-Net servers do not shuffle well, the
user identities are not anonymous. However, thus far, it has not been discussed whether the
algorithm mixes fairly.
In this paper, we will propose a method for confirming fair mixing. To confirm this condition, we
will attempt to find fixed points in the mix. If there are no fixed points in the mix, we can declare
that the mix was performed well and fairly.
What is “mix well”? What is “fixed point”?
Imagine a card game and a shuffle by the dealer.
Assume that before the mix, the cards are
   {1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13}.                                                 (1)
After the cards are shuffled by the dealer, they are
   {1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13},                                                 (2)
this shuffle is ‘not mixed at all’. If we have
   {1, 3, 2, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13},                                                 (3)
this shuffle is also ‘not mixed well’. In the shuffle above, only 2 and 3 are swapped. If we have
   {1, 3, 2, 7, 6, 5, 8, 13, 12, 9, 10, 11,4},                                                  (4)
this shuffle is almost mixed well but it is ‘not mixed completely.’ In this shuffle, 1 is in the same
position before and after the shuffle. This 1 is known as the “fixed point.” This example contains
only one fixed point.
We can characterize a mix as ‘not mixed completely’ when there is even a single fixed point.
Conversely, we define that when there are no fixed points in the shuffle, the mix is ‘mixed well
completely.’
In this paper, we will propose a method to confirm whether a mix is ‘mixed well completely.’ In
the method, we ascertain whether there are any fixed points in the mix. As described above,
when we have no fixed point, the mix is ‘mixed well completely.’

3. RELATED WORK AND OUR GOAL
Thus far, ‘how to shuffle well’ has not been discussed. First, in [8], we had proposed a similar
method. However, in that system, we have to do test repeatedly because it may be wrong if only
once. When the test result is “we have fixed point,” there may actually be no fixed point. The
probability of this error is 1/N, when N is number of cards. To reduce this probability, we need to
repeat the test. Hence, this method is not efficient.
In the new scheme presented in this paper, the probability of an error approaches zero. Hence, we
need to perform the procedure only once to confirm the shuffle. Thus, this method is simple and
efficient.
Our goal is to obtain a method to confirm whether the mix is ‘mixed well completely.’ However,
we can confirm only whether fixed points exist, and we can keep the details on ‘how to shuffle’
secret. In addition, we focus on only fixed points in the mix system. Hence, we will not delve
into the details of the mix system in examples, such as a card game or a Mix-Net.

4. PROPOSED METHOD
We assume that a network consists of mix servers, which are placed in line, and these servers
shuffle messages in turn. This system is the same as Mix-Net.
We denote the servers that shuffle as T1, T2,…,TM, where M is the number of servers. Each mix
server shuffles N messages from the previous server and sends them to the next server.
                                                                                                      52
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.1, January 2013
Each mix server Tl has three functions: (1) a permutation function π, (2) an encrypt function E,
and (3) a decrypt function D. The permutation function is denoted as ߨ௟ ሺ݅ሻ ൌ ݆, which means that
the mix servers Tl change position i for position j. The encrypt function is denoted as E (P:k),
where P is plain text and the encrypt key is k. The decrypt function is denoted as D (C:k), where
C is the encrypted message and the decrypt key is k. Additionally, the encrypt and decrypt
function must be commutative.
Commutative means that for any plain text P and any keys k1, k2,
                 E (P:k1,k2) = E (P:k2,k1).                                                     (5)
Both the encrypt key and the decrypt key must be secret.
We illustrate the whole system in Figure 1. In this figure, we have three mix servers and three
messages. {a1, a2, a3} is shuffled through all the servers and this mix system generates an output
{a1,a3, a2}. This system has one fixed point a1. Hence, it is ‘not mixed well.’
A ‘tester’ generates test values such as {a1, a2, a3} and initiates the test, as shown in Figure 1.The
tester also has an encrypt and decrypt function. These encrypt and decrypt functions must be
commutative with each other as well as with the functions of the mix servers. Additionally, all
the encrypt keys and decrypt keys of the tester must remain secret.




                                          Figure 1. Mix system


We describe the procedure for confirming fixed points in this system. We require two turns to
complete the procedure. The tester needs to generate N test values and Nencrypt and decrypt keys.
                                               ଴
We denote the encrypt keys of the tester with ݇௜ ( i=1,2,…,N ).
The initial test value is defined as
        J = {a1,a2,…,aN} ai : any integer                                                       (6)
The tester encrypts each test value ai with a corresponding key   ݇௜଴   (i=1,2,…,N) and sends them to
the mix server T1.
Each mix server Tl receives the test values from the tester or the previous mix server, shuffles
them, and encrypts each test value with a corresponding key in turn 1. Each mix server Tl has N
encrypt and decrypt keys. They must be secret and the encrypt and decrypt functions must be
commutative with each other. The resultant values of turn 1 are returned to the tester, which uses
them as the input value in turn 2.
In turn 2, each mix server performs a similar procedure; each mix server shuffles and decrypts
the test values. We proceed to describe these turns in detail.
< Turn 1 >
The tester encrypts each element of the initial test value J using the public key ݇௜଴ . Subsequently,
the tester sends the encrypted values to T1.
                  ଴            ଴              ଴
        {E (a1 : ݇ଵ ), E (a2: ݇ଶ ),…, E (aN: ݇ே )}.                                             (7)
                                                                                                      53
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.1, January 2013
                                                                           ଵ
T1 shuffles these values and encrypts them using the secret encrypt keys {݇௜ } (i=1,2,…,N). Then,
T1 send the resultant values to T2. The values that T1 will send are
                     ଴ ଵ
         {…., E (ai:݇௜ ,݇ሺగଵሺ௜ሻሻ ,…)}.                                                          (8)
T2 also shuffles these test values and encrypts them using the secret keys {݇௜ଶ }. Then, T2 send the
final values to T3. They are
                     ଴ ଵ           ଶ
         {…., E (ai:݇௜ ,݇ሺగଵሺ௜ሻሻ ,݇గଶሺగଵሺ௜ሻሻ ,…)}.                                             (9)
The mix servers that follow perform the same procedure. The values sent by the last server TM
back to T1 is
                        ଴ ଵ           ଶ
         Y1= {…, E (ai:݇௜ ,݇ሺగଵሺ௜ሻሻ ,݇గଶሺగଵሺ௜ሻሻ ,
             ெ
         …, ݇஠ெ ሺ ஠ெିଵ ሺ ஠ெିଶ ሺ …ሺ஠ଷሺ஠ଶሺ஠ଵሺ௜ ሻ… ሻ ),…)}.
                                                                                                (10)
Y1 is the result of turn 1.

< Turn 2>
The procedure followed in turn 2 is similar to that in turn 1.In turn 1, we use the initial test value
J; however, in turn 2, we use Y1 as the initial value. In turn 1, we encrypted the elements; in turn
2, we decrypt these elements.
TM sends Y1 to T1. T1 shuffles Y1 in the same manner as that in turn 1 and decrypts each element
of Y1. Subsequently, T1 send them to T2.
The mix servers that follow perform the same action. They shuffle and decrypt the elements. The
last server TM sends the decrypted elements back to the tester. The tester also decrypts these to
obtain Y2. Y2 is the result of turn 2.
The tester can compare J with Y2 and find fixed points. If we have the same value at its original
position, it is a fixed point. When we have

         J = {a1, a2,…,aN}                                                                      (11)
         Y2 = {y21, y22,….,y2N},                                                                (12)
and there exists i such that
         ai= y2i,                                                                               (13)
then this is a fixed point. Thus, the test is completed.
If an element is a fixed point, that element must go through the same route, both in turn 1 and in
turn 2. In this case, the encrypt keys, which the mix servers use in turn 1, match all the decrypt
keys, which mix servers use in turn 2. Thus, the fixed points are restored to their initial values.

5. SAMPLE EXAMPLE
We describe this process using a simple example wherein the number of mix servers and the
number of messages for shuffling are manageably small. We have three mix servers and three
messages, similar to the example in Figure 1. In this example, we have one fixed point, which is
the first element.




                                                                                                       54
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.1, January 2013
< Turn 1 >
1)   The tester generates the initial test value J.
         J = {a1, a2, a3}                                                                               (14)
2)    Each element of J is encrypted with    {݇௜଴ } (i = 1, 2, 3) by the tester, and these elements are
     sent to T1. {݇௜଴ } are the encrypt keys of the tester.
                ଴
         E (a1:݇ଵ )                                                                          (15-1)
                  ଴
         E   (a2:݇ଶ   )                                                                      (15-2)
                ଴
         E (a3:݇ଷ )                                                                          (15-3)
3)   T1 receives the test values from the tester and shuffles them using ߨଵ . ߨଵ is a function to
     shuffle elements.
         ߨଵ ሺ1ሻ ൌ 2                                                                          (16-1)
         ߨଵ ሺ2ሻ ൌ 3                                                                          (16-2)
         ߨଵ ሺ3ሻ ൌ 1                                                                          (16-3)
                                                   ଵ                                            ଵ
4)   Each shuffled element is encrypted with     {݇௜ } by T1, and the results are sent to T2. {݇௜ ሽ are
     the encrypt keys of T1. Note that, after the shuffle, the positions of the elements are changed.
                ଴ ଵ
         E (a3:݇ଷ ,݇ଵ )                                                                      (17-3)
                ଴ ଵ
         E (a1:݇ଵ ,݇ଶ )                                                                      (17-1)
                  ଴ ଵ
         E   (a2:݇ଶ ,݇ଷ )                                                                    (17-2)
5)   T2 shuffles the encrypted elements using ߨଶ . ߨଶ is a function to shuffle elements.
         ߨଶ ሺ1ሻ ൌ 3                                                                          (18-1)
         ߨଶ ሺ2ሻ ൌ 2                                                                          (18-2)
         ߨଶ ሺ3ሻ ൌ 1                                                                          (18-3)
6)   Each shuffled element is encrypted with {݇௜ଶ } by T2, and this is sent to T3. {݇௜ ሽ are the
                                                                                     ଶ

     encrypt keys of T2.
                ଴ ଵ ଶ
         E (a2:݇ଶ ,݇ଷ ,݇ଵ )                                                                  (19-1)
                  ଴ ଵ ଶ
         E   (a1:݇ଵ ,݇ଶ ,݇ଶ )                                                                (19-2)
                ଴ ଵ ଶ
         E (a3:݇ଷ ,݇ଵ ,݇ଷ )                                                                  (19-3)
7)   T3 shuffles the encrypted elements using ߨଷ . ߨଷ is a function to shuffle elements.
         ߨଷ ሺ1ሻ ൌ 3                                                                          (20-1)
         ߨଷ ሺ2ሻ ൌ 1                                                                          (20-2)
         ߨଷ ሺ3ሻ ൌ 2                                                                          (20-3)
                                                   ଷ                ଷ
8)   Each shuffled element is encrypted with     {݇௜ }   by   T3. {݇௜ }   are the encrypt keys of T3.
                ଴ ଵ ଶ ଷ
         E (a1:݇ଵ ,݇ଶ ,݇ଶ ,݇ଵ )                                                              (21-1)
                  ଴ ଵ ଶ ଷ
         E   (a3:݇ଷ ,݇ଵ ,݇ଷ ,݇ଶ )                                                            (21-3)
                  ଴ ଵ ଶ ଷ
         E   (a2:݇ଶ ,݇ଷ ,݇ଵ ,݇ଷ )                                                            (21-2)
Turn 1 is completed and the values obtained above are the results of turn 1.


                                                                                                               55
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.1, January 2013
< Turn 2 >
Turn 2 is similar to turn 1.We use an initial test value in turn 1; however, in turn 2 we use the
resultant values of turn 1 as the initial test value. In turn 1, we encrypt the elements; in turn 2, we
decrypt these elements.
1)   T3 sends the results of turn 1 to T1.
2)   T1 shuffles them using
         ߨଵ ሺ1ሻ ൌ 2                                                                     (22-1)
         ߨଵ ሺ2ሻ ൌ 3                                                                     (22-2)
         ߨଵ ሺ3ሻ ൌ 1                                                                     (22-3)
3)   Each shuffled element is decrypted with a decrypt key corresponding to the encrypt key
        ଵ                                                                  ୨
     {݇௜ }. Here,for convenience in explanation, we use the same term ቄ݇௜ ቅ to denote the
     encrypt and the decrypt keys. The following results are sent to T2.
                   ଴ ଵ ଶ ଷ          ଵ
         D (E (a3:݇ଷ ,݇ଵ ,݇ଷ ,݇ଶ ):݇ଷ )                                                 (23-1)
                   ଴ ଵ ଶ ଷ          ଵ
         D (E (a1:݇ଵ ,݇ଶ ,݇ଶ ,݇ଵ ):݇ଶ )                                                 (23-2)
                     ଴ ଵ ଶ ଷ          ଵ
         D (E   (a2:݇ଶ ,݇ଷ ,݇ଵ ,݇ଷ ):݇ଵ   )                                             (23-3)
4)   T2 shuffles them using
         ߨଶ ሺ1ሻ ൌ 3                                                                     (24-1)
         ߨଶ ሺ2ሻ ൌ 2                                                                     (24-2)
         ߨଶ ሺ3ሻ ൌ 1                                                                     (24-3)
                                               ଶ
5)   Each shuffled element is decrypted with {݇௜ } by T2and the following results are sent to T3.
                   ଴ ଵ ଶ ଷ          ଵ ଶ
         D (E (a2:݇ଶ ,݇ଷ ,݇ଵ ,݇ଷ ):݇ଵ ,݇ଷ )                                             (25-1)
                   ଴ ଵ ଶ ଷ          ଵ ଶ
         D (E (a1:݇ଵ ,݇ଶ ,݇ଶ ,݇ଵ ):݇ଶ ,݇ଶ )                                             (25-2)
                     ଴ ଵ ଶ ଷ          ଵ ଶ
         D (E   (a3:݇ଷ ,݇ଵ ,݇ଷ ,݇ଶ ):݇ଷ ,݇ଵ   )                                         (25-3)
6)   T2 shuffles them using
         ߨଷ ሺ1ሻ ൌ 3                                                                     (26-1)
         ߨଷ ሺ2ሻ ൌ 1                                                                     (26-2)
         ߨଷ ሺ3ሻ ൌ 2                                                                     (26-3)
                                               ଷ
7)   Each shuffled element is decrypted with {݇௜ } by T3and the following results are sent back
     to the tester.
                   ଴ ଵ ଶ ଷ          ଵ ଶ ଷ
         D (E (a1:݇ଵ ,݇ଶ ,݇ଶ ,݇ଵ ):݇ଶ ,݇ଶ ,݇ଵ )                                         (27-1)
                     ଴ ଵ ଶ ଷ          ଵ ଶ ଷ
         D (E   (a3:݇ଷ ,݇ଵ ,݇ଷ ,݇ଶ ):݇ଷ ,݇ଵ ,݇ଷ )                                       (27-2)
                     ଴ ଵ ଶ ଷ          ଵ ଶ ଷ
         D (E   (a2:݇ଶ ,݇ଷ ,݇ଵ ,݇ଷ ):݇ଵ ,݇ଷ ,݇ଶ )                                       (27-3)
                                                          ଴
8)   Each shuffled element is decrypted with            {݇௜   } by the tester.
                   ଴ ଵ ଶ ଷ          ଵ ଶ ଷ ଴
         D (E (a1:݇ଵ ,݇ଶ ,݇ଶ ,݇ଵ ):݇ଶ ,݇ଶ ,݇ଵ ,݇ଵ ) = a1                                (28-1)
                     ଴ ଵ ଶ ଷ          ଵ ଶ ଷ ଴
         D (E   (a3:݇ଷ ,݇ଵ ,݇ଷ ,݇ଶ ):݇ଷ ,݇ଵ ,݇ଷ ,݇ଷ )                                   (28-2)
                     ଴ ଵ ଶ ଷ          ଵ ଶ ଷ ଴
         D (E   (a2:݇ଶ ,݇ଷ ,݇ଵ ,݇ଷ ):݇ଵ ,݇ଷ ,݇ଶ ,݇ଶ )                                   (28-3)
9)   The tester obtains the result of the decryption. The tester can compare (14) with (28-1,2,3)
     and find fixed points. If we have the same value at its original position, it is a fixed point. In
                                                                                                       56
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.1, January 2013
     this example, we have one fixed point, which is the first element a1. Figure 2 illustrates this
     example.


If an element is a fixed point, that element must go through the same route, both in turn 1 and in
turn 2. In this case, element a1 goes through the same route in turn 1 and in turn 2.As all the
                    ଴   ଵ   ଶ   ଷ
encrypt keys {݇ଵ , ݇ଶ , ݇ଶ , ݇ଵ }, which the mix servers use in turn 1, match all the decrypt
        ଴   ଵ   ଶ     ଷ
keys{݇ଵ , ݇ଶ , ݇ଶ , ݇ଵ }, which mix servers use in turn 2,the fixed point is restored to its initial
values.


                    Turn1
                                      T1         T2        T3
                                 k0
                                  1                             k3
                            a1                                   1
                                           k1
                                            2      k2
                                                    2



                    Turn2
                                      T1         T2        T3
                                                                     0
                                                                k3 k 1
                                                                 1       a1
                                           k1
                                            2      k2
                                                    2




                                            Figure 2. Example


6. SECURITY ANALYSIS
In this chapter, we discuss the security analysis of our scheme. However, we only focus on
attacks that attempt to infer the path of the messages using the test results. We do not include
other types of attacks, such as the simple sabotage without the profit, in our discussion.
First, we assume that all mix servers are fair. The attacker (may include a tester) attempts to infer
the permutation of each mix server using only the result value. If the tester is a attacker, the tester
can use any initial value to perpetrate the attack.
The attacker attempts to chase the test value by comparing the input with the output of the mix
servers in order to infer the permutation. However, the encrypt keys, with which the input values
are encrypted, are not known by the perpetrator as the keys are not public. This implies that an
attacker cannot chase an element using only the test values as these values are encrypted at the
output.
If the difference between the maximum and the minimum value of the input is large, for example
{10000000, 2, 3,…}, the old scheme [8] is problematic. However, in the new scheme proposed
in this paper, we encrypt the values. When we encrypt them, we use ‘modulo’ like RSA and the
difference in the sizes of the test values is rendered meaningless.
Next, we assume an attack by only one malicious mix server. However, a single mix server can
hardly attack alone because the other mix servers shuffle and encrypt values using individual
secret keys, hence the values cannot be chased.

                                                                                                      57
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.1, January 2013
Finally, we assume that the fair mix server S, between unjust mix servers P and Q, is attacked,
and the attackers conspire to infer the permutation of the fair server S.
In turn 1, P send test value U to S, and Q obtains an output V from S. They use this V in turn 2. P
sends V to S as the input in turn 2 and Q obtains output W from S. The result of the test in the
complete mix system becomes erroneous because the malicious servers discard the real values.
Figure 3 shows this attack.




                                     Figure 3.Attack from both side.


P and Q infer the permutation of S by comparing U with W. If there is a value at the same
position between U and W, the malicious servers can identify the fixed point of the permutation
of the mix server S. P and Q cannot know the permutation of the entire mix system; however,
this is a leak of a subset of the permutation in the mix system. This results in a breach of
anonymity. We can prevent this by checking whether the output V and input V on S are the same.
But unjust mix servers P and Q generate V’ from V by encryption, and different values can be
generated for the same input value. V’ can be used for injustice. The fixed points can be
identified by obtaining W’ from V’ via server S and converting it back to W.
To prevent this type of attack, we can add a new process. All mix servers T1, T2,…,TM have keys
pi and qi of commutative function such that when a is plain text
D (E (a:p1, p2, p3,…, pM): q1, q2, q3,…, qM) = a.                                     (29)
However, basically, D (E (a:pi):qi)is not equal to a. In other words, key pi is not corresponding to
key qi.
We can create these keys in a manner such that on public encrypt systems E and D, when the
public keys are{p1, p2, p3,…,pM}, the private keys are {q1, q2, q3,…, qM}.
In turn 1, each mix server Ti encrypts values using pi, and in turn 2 they are decrypted using qi.
By the addition of this procedure in the example shown in figure 3, malicious mix servers P and
Q cannot find the fixed points because all {p1, p2, p3,…pM} and {q1,q2,q3,…qM} are necessary to
erase all encryption. If at least two or more mix servers do not join in a malicious attack, injustice
does not occur.




                                                                                                      58
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.1, January 2013

7. CONCLUSION
In this paper, we proposed a method to find fixed points in a mix system without reviewing
shuffling. The probability of an error using this method approaches zero. Hence, the procedure
needs to be performed only once to obtain optimal results.

REFERENCES
[1]       D. Chaum, (1981) “Untraceable Electronic Mail, Return Address, and Digital Pseudonyms,”
          Communications of the ACM, Vol. 24, No. 2, pp.84-88, 2.
[2]       Kun Peng, (2011) “Failure of a Mix Network”, International Journal of Network Security & Its
          Applications (IJNSA), Vol. 3, No. 1, 1.
[3]       M. Okamoto & Y. Tanaka, (2006) “Secret Information Distribution,” The Transactions of the
          Institute of Electronics, Information and Communication Engineers, A J89-A (8), pp.662-670.
[4]       M. Okamoto, (2011) “A Multiple Ballots Election Scheme Using Anonymous Distribution,”
          International Journal of Network Security & Its Applications (IJNSA), Vol. 3, No. 5, 9.
[5]       B. Schneier, (1996) “Applied Cryptography,” John Wiley & Sons.
[6]       A. Shimir, R. Rivest, & L. Adleman, (1981) “Mental Poker,” The Mathematical Gardner,
          Wadsworth International, California, pp.37-43.
[7]       H. Jayasree& A. Damodaram, (2012) “A Novel Fair Anonymous Contract Signing Protocol for
          E-Commerce Applications,” International Journal of Network Security & Its Applications
          (IJNSA), Vol. 4, No. 59.
[8]       M. Kageshima, M. Okamoto, (2011) “How to find a Fixed point in a Mix System,” TENCON
          2011-2011 IEEE Region 10 Conference, Bali, Indonesia11.


Authors
MikakoKageshima
          She is a student at Kanagawa Institute of Technology.
Manabu Okamoto
          He received B.S. and M.S. degrees in
          Mathematics from Waseda University
          in 1995 and 1997, respectively. In
          2010, he received a doctoral degree in
          the field of Global Information and
          Telecommunication from Waseda
          University. He is now an Associate
          Professor at Kanagawa Institute of
          Technology.




                                                                                                        59

More Related Content

What's hot

First Finite Divided Difference Calculator Using MIT App Inventor 2
First Finite Divided Difference Calculator Using MIT App Inventor 2First Finite Divided Difference Calculator Using MIT App Inventor 2
First Finite Divided Difference Calculator Using MIT App Inventor 2Camille Bianca Gomez
 
A New Method for Preserving Privacy in Data Publishing Against Attribute and ...
A New Method for Preserving Privacy in Data Publishing Against Attribute and ...A New Method for Preserving Privacy in Data Publishing Against Attribute and ...
A New Method for Preserving Privacy in Data Publishing Against Attribute and ...ijcisjournal
 
Using NP Problems to Share Keys in Secret-Key Cryptography
Using NP Problems to Share Keys in Secret-Key CryptographyUsing NP Problems to Share Keys in Secret-Key Cryptography
Using NP Problems to Share Keys in Secret-Key Cryptographyiosrjce
 
Jeffrey xu yu large graph processing
Jeffrey xu yu large graph processingJeffrey xu yu large graph processing
Jeffrey xu yu large graph processingjins0618
 
An Analysis of Fraudulence in Fuzzy Commitment Scheme With Trusted Party
An Analysis of Fraudulence in Fuzzy Commitment Scheme With Trusted PartyAn Analysis of Fraudulence in Fuzzy Commitment Scheme With Trusted Party
An Analysis of Fraudulence in Fuzzy Commitment Scheme With Trusted PartyCSCJournals
 
Database Applications in Analyzing Agents
Database Applications in Analyzing AgentsDatabase Applications in Analyzing Agents
Database Applications in Analyzing Agentsiosrjce
 
FINAL_Report_RAMEYJM_NAGR
FINAL_Report_RAMEYJM_NAGRFINAL_Report_RAMEYJM_NAGR
FINAL_Report_RAMEYJM_NAGRJacob Ramey
 
LITTLE DRAGON TWO: AN EFFICIENT MULTIVARIATE PUBLIC KEY CRYPTOSYSTEM
LITTLE DRAGON TWO: AN EFFICIENT MULTIVARIATE PUBLIC KEY CRYPTOSYSTEMLITTLE DRAGON TWO: AN EFFICIENT MULTIVARIATE PUBLIC KEY CRYPTOSYSTEM
LITTLE DRAGON TWO: AN EFFICIENT MULTIVARIATE PUBLIC KEY CRYPTOSYSTEMIJNSA Journal
 
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHYRSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHYQualcomm
 
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support CountsSymmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Countsacijjournal
 
Exploiting Distributional Semantics Models for Natural Language Context-aware...
Exploiting Distributional Semantics Models for Natural Language Context-aware...Exploiting Distributional Semantics Models for Natural Language Context-aware...
Exploiting Distributional Semantics Models for Natural Language Context-aware...GiuseppeSpillo
 
Information theory & coding (ECE)
Information theory & coding (ECE)Information theory & coding (ECE)
Information theory & coding (ECE)nitmittal
 

What's hot (16)

First Finite Divided Difference Calculator Using MIT App Inventor 2
First Finite Divided Difference Calculator Using MIT App Inventor 2First Finite Divided Difference Calculator Using MIT App Inventor 2
First Finite Divided Difference Calculator Using MIT App Inventor 2
 
A New Method for Preserving Privacy in Data Publishing Against Attribute and ...
A New Method for Preserving Privacy in Data Publishing Against Attribute and ...A New Method for Preserving Privacy in Data Publishing Against Attribute and ...
A New Method for Preserving Privacy in Data Publishing Against Attribute and ...
 
Using NP Problems to Share Keys in Secret-Key Cryptography
Using NP Problems to Share Keys in Secret-Key CryptographyUsing NP Problems to Share Keys in Secret-Key Cryptography
Using NP Problems to Share Keys in Secret-Key Cryptography
 
Jeffrey xu yu large graph processing
Jeffrey xu yu large graph processingJeffrey xu yu large graph processing
Jeffrey xu yu large graph processing
 
A Three-Layer Visual Hash Function Using Adler-32
A Three-Layer Visual Hash Function Using Adler-32A Three-Layer Visual Hash Function Using Adler-32
A Three-Layer Visual Hash Function Using Adler-32
 
An Analysis of Fraudulence in Fuzzy Commitment Scheme With Trusted Party
An Analysis of Fraudulence in Fuzzy Commitment Scheme With Trusted PartyAn Analysis of Fraudulence in Fuzzy Commitment Scheme With Trusted Party
An Analysis of Fraudulence in Fuzzy Commitment Scheme With Trusted Party
 
Database Applications in Analyzing Agents
Database Applications in Analyzing AgentsDatabase Applications in Analyzing Agents
Database Applications in Analyzing Agents
 
CS799_FinalReport
CS799_FinalReportCS799_FinalReport
CS799_FinalReport
 
FINAL_Report_RAMEYJM_NAGR
FINAL_Report_RAMEYJM_NAGRFINAL_Report_RAMEYJM_NAGR
FINAL_Report_RAMEYJM_NAGR
 
LITTLE DRAGON TWO: AN EFFICIENT MULTIVARIATE PUBLIC KEY CRYPTOSYSTEM
LITTLE DRAGON TWO: AN EFFICIENT MULTIVARIATE PUBLIC KEY CRYPTOSYSTEMLITTLE DRAGON TWO: AN EFFICIENT MULTIVARIATE PUBLIC KEY CRYPTOSYSTEM
LITTLE DRAGON TWO: AN EFFICIENT MULTIVARIATE PUBLIC KEY CRYPTOSYSTEM
 
Game Theory Assignment
Game Theory AssignmentGame Theory Assignment
Game Theory Assignment
 
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHYRSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
 
15
1515
15
 
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support CountsSymmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
 
Exploiting Distributional Semantics Models for Natural Language Context-aware...
Exploiting Distributional Semantics Models for Natural Language Context-aware...Exploiting Distributional Semantics Models for Natural Language Context-aware...
Exploiting Distributional Semantics Models for Natural Language Context-aware...
 
Information theory & coding (ECE)
Information theory & coding (ECE)Information theory & coding (ECE)
Information theory & coding (ECE)
 

Viewers also liked

Blackthorne Manor Battle Plans
Blackthorne Manor Battle PlansBlackthorne Manor Battle Plans
Blackthorne Manor Battle Planscsgmiddleages
 
Interview question types
Interview question typesInterview question types
Interview question typeseklauber
 
Why You'll Never Tweet Alone
Why You'll Never Tweet AloneWhy You'll Never Tweet Alone
Why You'll Never Tweet AloneGina Bowes
 
DrRic -Detox Deconstructed (slide share edition)
DrRic -Detox Deconstructed  (slide share edition)DrRic -Detox Deconstructed  (slide share edition)
DrRic -Detox Deconstructed (slide share edition)DrRic Saguil
 
RightScale Webinar: Compliance in the Cloud
RightScale Webinar: Compliance in the CloudRightScale Webinar: Compliance in the Cloud
RightScale Webinar: Compliance in the CloudRightScale
 
Business Network North SEO Seminar Notes Aug 2012
Business Network North SEO Seminar Notes Aug 2012Business Network North SEO Seminar Notes Aug 2012
Business Network North SEO Seminar Notes Aug 2012andy1005
 
En d homesb_slm_v4030
En d homesb_slm_v4030En d homesb_slm_v4030
En d homesb_slm_v4030mauga1986
 
Bridging the lifespan
Bridging the lifespanBridging the lifespan
Bridging the lifespanGregory Boyd
 
ICT služby ASBIS-u
ICT služby ASBIS-uICT služby ASBIS-u
ICT služby ASBIS-uASBIS SK
 

Viewers also liked (11)

Blackthorne Manor Battle Plans
Blackthorne Manor Battle PlansBlackthorne Manor Battle Plans
Blackthorne Manor Battle Plans
 
Interview question types
Interview question typesInterview question types
Interview question types
 
Why You'll Never Tweet Alone
Why You'll Never Tweet AloneWhy You'll Never Tweet Alone
Why You'll Never Tweet Alone
 
DrRic -Detox Deconstructed (slide share edition)
DrRic -Detox Deconstructed  (slide share edition)DrRic -Detox Deconstructed  (slide share edition)
DrRic -Detox Deconstructed (slide share edition)
 
RightScale Webinar: Compliance in the Cloud
RightScale Webinar: Compliance in the CloudRightScale Webinar: Compliance in the Cloud
RightScale Webinar: Compliance in the Cloud
 
Business Network North SEO Seminar Notes Aug 2012
Business Network North SEO Seminar Notes Aug 2012Business Network North SEO Seminar Notes Aug 2012
Business Network North SEO Seminar Notes Aug 2012
 
En d homesb_slm_v4030
En d homesb_slm_v4030En d homesb_slm_v4030
En d homesb_slm_v4030
 
Quiz Interact User Manual
Quiz Interact User ManualQuiz Interact User Manual
Quiz Interact User Manual
 
Itc
ItcItc
Itc
 
Bridging the lifespan
Bridging the lifespanBridging the lifespan
Bridging the lifespan
 
ICT služby ASBIS-u
ICT služby ASBIS-uICT služby ASBIS-u
ICT služby ASBIS-u
 

Similar to HOW TO FIND A FIXED POINT IN SHUFFLE EFFICIENTLY

HOW TO FIND A FIXED POINT IN SHUFFLE EFFICIENTLY
HOW TO FIND A FIXED POINT IN SHUFFLE EFFICIENTLYHOW TO FIND A FIXED POINT IN SHUFFLE EFFICIENTLY
HOW TO FIND A FIXED POINT IN SHUFFLE EFFICIENTLYIJNSA Journal
 
Secured transmission through multi layer perceptron in wireless communication...
Secured transmission through multi layer perceptron in wireless communication...Secured transmission through multi layer perceptron in wireless communication...
Secured transmission through multi layer perceptron in wireless communication...ijmnct
 
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...pijans
 
Neuro genetic key based recursive modulo 2 substitution using mutated charact...
Neuro genetic key based recursive modulo 2 substitution using mutated charact...Neuro genetic key based recursive modulo 2 substitution using mutated charact...
Neuro genetic key based recursive modulo 2 substitution using mutated charact...ijcsity
 
Secured wireless communication through simulated annealing guided traingulari...
Secured wireless communication through simulated annealing guided traingulari...Secured wireless communication through simulated annealing guided traingulari...
Secured wireless communication through simulated annealing guided traingulari...csandit
 
SECURED WIRELESS COMMUNICATION THROUGH SIMULATED ANNEALING GUIDED TRAINGULARI...
SECURED WIRELESS COMMUNICATION THROUGH SIMULATED ANNEALING GUIDED TRAINGULARI...SECURED WIRELESS COMMUNICATION THROUGH SIMULATED ANNEALING GUIDED TRAINGULARI...
SECURED WIRELESS COMMUNICATION THROUGH SIMULATED ANNEALING GUIDED TRAINGULARI...cscpconf
 
Chp-1 Quick Review of basic concepts.pdf
Chp-1 Quick Review of basic concepts.pdfChp-1 Quick Review of basic concepts.pdf
Chp-1 Quick Review of basic concepts.pdfSolomonMolla4
 
GROUP SESSION KEY EXCHANGE MULTILAYER PERCEPTRON BASED SIMULATED ANNEALING GU...
GROUP SESSION KEY EXCHANGE MULTILAYER PERCEPTRON BASED SIMULATED ANNEALING GU...GROUP SESSION KEY EXCHANGE MULTILAYER PERCEPTRON BASED SIMULATED ANNEALING GU...
GROUP SESSION KEY EXCHANGE MULTILAYER PERCEPTRON BASED SIMULATED ANNEALING GU...ijwmn
 
Intelligent soft computing based
Intelligent soft computing basedIntelligent soft computing based
Intelligent soft computing basedijasa
 
Cryptography using artificial neural network
Cryptography using artificial neural networkCryptography using artificial neural network
Cryptography using artificial neural networkMahira Banu
 
Synthesized report on the comparison of lut and splitting method for decrypti...
Synthesized report on the comparison of lut and splitting method for decrypti...Synthesized report on the comparison of lut and splitting method for decrypti...
Synthesized report on the comparison of lut and splitting method for decrypti...eSAT Journals
 
Basics in algorithms and data structure
Basics in algorithms and data structure Basics in algorithms and data structure
Basics in algorithms and data structure Eman magdy
 
Secure E-voting System by Utilizing Homomorphic Properties of the Encryption ...
Secure E-voting System by Utilizing Homomorphic Properties of the Encryption ...Secure E-voting System by Utilizing Homomorphic Properties of the Encryption ...
Secure E-voting System by Utilizing Homomorphic Properties of the Encryption ...TELKOMNIKA JOURNAL
 
07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdfbaysahcmjames2kblax
 
VCE Unit 01 (2).pptx
VCE Unit 01 (2).pptxVCE Unit 01 (2).pptx
VCE Unit 01 (2).pptxskilljiolms
 

Similar to HOW TO FIND A FIXED POINT IN SHUFFLE EFFICIENTLY (20)

HOW TO FIND A FIXED POINT IN SHUFFLE EFFICIENTLY
HOW TO FIND A FIXED POINT IN SHUFFLE EFFICIENTLYHOW TO FIND A FIXED POINT IN SHUFFLE EFFICIENTLY
HOW TO FIND A FIXED POINT IN SHUFFLE EFFICIENTLY
 
Secured transmission through multi layer perceptron in wireless communication...
Secured transmission through multi layer perceptron in wireless communication...Secured transmission through multi layer perceptron in wireless communication...
Secured transmission through multi layer perceptron in wireless communication...
 
B041306015
B041306015B041306015
B041306015
 
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
 
Neuro genetic key based recursive modulo 2 substitution using mutated charact...
Neuro genetic key based recursive modulo 2 substitution using mutated charact...Neuro genetic key based recursive modulo 2 substitution using mutated charact...
Neuro genetic key based recursive modulo 2 substitution using mutated charact...
 
Oech03
Oech03Oech03
Oech03
 
Secured wireless communication through simulated annealing guided traingulari...
Secured wireless communication through simulated annealing guided traingulari...Secured wireless communication through simulated annealing guided traingulari...
Secured wireless communication through simulated annealing guided traingulari...
 
SECURED WIRELESS COMMUNICATION THROUGH SIMULATED ANNEALING GUIDED TRAINGULARI...
SECURED WIRELESS COMMUNICATION THROUGH SIMULATED ANNEALING GUIDED TRAINGULARI...SECURED WIRELESS COMMUNICATION THROUGH SIMULATED ANNEALING GUIDED TRAINGULARI...
SECURED WIRELESS COMMUNICATION THROUGH SIMULATED ANNEALING GUIDED TRAINGULARI...
 
Chp-1 Quick Review of basic concepts.pdf
Chp-1 Quick Review of basic concepts.pdfChp-1 Quick Review of basic concepts.pdf
Chp-1 Quick Review of basic concepts.pdf
 
GROUP SESSION KEY EXCHANGE MULTILAYER PERCEPTRON BASED SIMULATED ANNEALING GU...
GROUP SESSION KEY EXCHANGE MULTILAYER PERCEPTRON BASED SIMULATED ANNEALING GU...GROUP SESSION KEY EXCHANGE MULTILAYER PERCEPTRON BASED SIMULATED ANNEALING GU...
GROUP SESSION KEY EXCHANGE MULTILAYER PERCEPTRON BASED SIMULATED ANNEALING GU...
 
Intelligent soft computing based
Intelligent soft computing basedIntelligent soft computing based
Intelligent soft computing based
 
Cryptography using artificial neural network
Cryptography using artificial neural networkCryptography using artificial neural network
Cryptography using artificial neural network
 
I1803014852
I1803014852I1803014852
I1803014852
 
Pdp12
Pdp12Pdp12
Pdp12
 
Synthesized report on the comparison of lut and splitting method for decrypti...
Synthesized report on the comparison of lut and splitting method for decrypti...Synthesized report on the comparison of lut and splitting method for decrypti...
Synthesized report on the comparison of lut and splitting method for decrypti...
 
Basics in algorithms and data structure
Basics in algorithms and data structure Basics in algorithms and data structure
Basics in algorithms and data structure
 
Tic tac toe simple ai game
Tic tac toe simple ai gameTic tac toe simple ai game
Tic tac toe simple ai game
 
Secure E-voting System by Utilizing Homomorphic Properties of the Encryption ...
Secure E-voting System by Utilizing Homomorphic Properties of the Encryption ...Secure E-voting System by Utilizing Homomorphic Properties of the Encryption ...
Secure E-voting System by Utilizing Homomorphic Properties of the Encryption ...
 
07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf07 Data Link LayerError Control.pdf
07 Data Link LayerError Control.pdf
 
VCE Unit 01 (2).pptx
VCE Unit 01 (2).pptxVCE Unit 01 (2).pptx
VCE Unit 01 (2).pptx
 

Recently uploaded

Corporate Presentation Probe April 2024.pdf
Corporate Presentation Probe April 2024.pdfCorporate Presentation Probe April 2024.pdf
Corporate Presentation Probe April 2024.pdfProbe Gold
 
The Concept of Humanity in Islam and its effects at future of humanity
The Concept of Humanity in Islam and its effects at future of humanityThe Concept of Humanity in Islam and its effects at future of humanity
The Concept of Humanity in Islam and its effects at future of humanityJohanAspro
 
Leveraging USDA Rural Development Grants for Community Growth and Sustainabil...
Leveraging USDA Rural Development Grants for Community Growth and Sustainabil...Leveraging USDA Rural Development Grants for Community Growth and Sustainabil...
Leveraging USDA Rural Development Grants for Community Growth and Sustainabil...USDAReapgrants.com
 
Collective Mining | Corporate Presentation - April 2024
Collective Mining | Corporate Presentation - April 2024Collective Mining | Corporate Presentation - April 2024
Collective Mining | Corporate Presentation - April 2024CollectiveMining1
 
slideshare_2404_presentation materials_en.pdf
slideshare_2404_presentation materials_en.pdfslideshare_2404_presentation materials_en.pdf
slideshare_2404_presentation materials_en.pdfsansanir
 
Basic Accountants in|TaxlinkConcept.pdf
Basic  Accountants in|TaxlinkConcept.pdfBasic  Accountants in|TaxlinkConcept.pdf
Basic Accountants in|TaxlinkConcept.pdftaxlinkcpa
 
Best investment platform in india - falcon invoice discounting
Best investment platform in india - falcon invoice discountingBest investment platform in india - falcon invoice discounting
Best investment platform in india - falcon invoice discountingFalcon Invoice Discounting
 
9654467111 Low Rate Call Girls In Tughlakabad, Delhi NCR
9654467111 Low Rate Call Girls In Tughlakabad, Delhi NCR9654467111 Low Rate Call Girls In Tughlakabad, Delhi NCR
9654467111 Low Rate Call Girls In Tughlakabad, Delhi NCRSapana Sha
 
Corporate Presentation Probe April 2024.pdf
Corporate Presentation Probe April 2024.pdfCorporate Presentation Probe April 2024.pdf
Corporate Presentation Probe April 2024.pdfProbe Gold
 
the 25 most beautiful words for a loving and lasting relationship.pdf
the 25 most beautiful words for a loving and lasting relationship.pdfthe 25 most beautiful words for a loving and lasting relationship.pdf
the 25 most beautiful words for a loving and lasting relationship.pdfFrancenel Paul
 
WheelTug PLC Pitch Deck | Investor Insights | April 2024
WheelTug PLC Pitch Deck | Investor Insights | April 2024WheelTug PLC Pitch Deck | Investor Insights | April 2024
WheelTug PLC Pitch Deck | Investor Insights | April 2024Hector Del Castillo, CPM, CPMM
 
9654467111 Call Girls In Katwaria Sarai Short 1500 Night 6000
9654467111 Call Girls In Katwaria Sarai Short 1500 Night 60009654467111 Call Girls In Katwaria Sarai Short 1500 Night 6000
9654467111 Call Girls In Katwaria Sarai Short 1500 Night 6000Sapana Sha
 
Nicola Mining Inc. Corporate Presentation April 2024
Nicola Mining Inc. Corporate Presentation April 2024Nicola Mining Inc. Corporate Presentation April 2024
Nicola Mining Inc. Corporate Presentation April 2024nicola_mining
 
Q1 Quarterly Update - April 16, 2024.pdf
Q1 Quarterly Update - April 16, 2024.pdfQ1 Quarterly Update - April 16, 2024.pdf
Q1 Quarterly Update - April 16, 2024.pdfProbe Gold
 

Recently uploaded (19)

young call girls in Hauz Khas,🔝 9953056974 🔝 escort Service
young call girls in Hauz Khas,🔝 9953056974 🔝 escort Serviceyoung call girls in Hauz Khas,🔝 9953056974 🔝 escort Service
young call girls in Hauz Khas,🔝 9953056974 🔝 escort Service
 
Corporate Presentation Probe April 2024.pdf
Corporate Presentation Probe April 2024.pdfCorporate Presentation Probe April 2024.pdf
Corporate Presentation Probe April 2024.pdf
 
The Concept of Humanity in Islam and its effects at future of humanity
The Concept of Humanity in Islam and its effects at future of humanityThe Concept of Humanity in Islam and its effects at future of humanity
The Concept of Humanity in Islam and its effects at future of humanity
 
Leveraging USDA Rural Development Grants for Community Growth and Sustainabil...
Leveraging USDA Rural Development Grants for Community Growth and Sustainabil...Leveraging USDA Rural Development Grants for Community Growth and Sustainabil...
Leveraging USDA Rural Development Grants for Community Growth and Sustainabil...
 
Collective Mining | Corporate Presentation - April 2024
Collective Mining | Corporate Presentation - April 2024Collective Mining | Corporate Presentation - April 2024
Collective Mining | Corporate Presentation - April 2024
 
young call girls in Govindpuri 🔝 9953056974 🔝 Delhi escort Service
young call girls in Govindpuri 🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Govindpuri 🔝 9953056974 🔝 Delhi escort Service
young call girls in Govindpuri 🔝 9953056974 🔝 Delhi escort Service
 
slideshare_2404_presentation materials_en.pdf
slideshare_2404_presentation materials_en.pdfslideshare_2404_presentation materials_en.pdf
slideshare_2404_presentation materials_en.pdf
 
Basic Accountants in|TaxlinkConcept.pdf
Basic  Accountants in|TaxlinkConcept.pdfBasic  Accountants in|TaxlinkConcept.pdf
Basic Accountants in|TaxlinkConcept.pdf
 
young Call girls in Dwarka sector 1🔝 9953056974 🔝 Delhi escort Service
young Call girls in Dwarka sector 1🔝 9953056974 🔝 Delhi escort Serviceyoung Call girls in Dwarka sector 1🔝 9953056974 🔝 Delhi escort Service
young Call girls in Dwarka sector 1🔝 9953056974 🔝 Delhi escort Service
 
Best investment platform in india - falcon invoice discounting
Best investment platform in india - falcon invoice discountingBest investment platform in india - falcon invoice discounting
Best investment platform in india - falcon invoice discounting
 
9654467111 Low Rate Call Girls In Tughlakabad, Delhi NCR
9654467111 Low Rate Call Girls In Tughlakabad, Delhi NCR9654467111 Low Rate Call Girls In Tughlakabad, Delhi NCR
9654467111 Low Rate Call Girls In Tughlakabad, Delhi NCR
 
Corporate Presentation Probe April 2024.pdf
Corporate Presentation Probe April 2024.pdfCorporate Presentation Probe April 2024.pdf
Corporate Presentation Probe April 2024.pdf
 
the 25 most beautiful words for a loving and lasting relationship.pdf
the 25 most beautiful words for a loving and lasting relationship.pdfthe 25 most beautiful words for a loving and lasting relationship.pdf
the 25 most beautiful words for a loving and lasting relationship.pdf
 
WheelTug PLC Pitch Deck | Investor Insights | April 2024
WheelTug PLC Pitch Deck | Investor Insights | April 2024WheelTug PLC Pitch Deck | Investor Insights | April 2024
WheelTug PLC Pitch Deck | Investor Insights | April 2024
 
Call Girls in South Ex⎝⎝9953056974⎝⎝ Escort Delhi NCR
Call Girls in South Ex⎝⎝9953056974⎝⎝ Escort Delhi NCRCall Girls in South Ex⎝⎝9953056974⎝⎝ Escort Delhi NCR
Call Girls in South Ex⎝⎝9953056974⎝⎝ Escort Delhi NCR
 
9654467111 Call Girls In Katwaria Sarai Short 1500 Night 6000
9654467111 Call Girls In Katwaria Sarai Short 1500 Night 60009654467111 Call Girls In Katwaria Sarai Short 1500 Night 6000
9654467111 Call Girls In Katwaria Sarai Short 1500 Night 6000
 
Nicola Mining Inc. Corporate Presentation April 2024
Nicola Mining Inc. Corporate Presentation April 2024Nicola Mining Inc. Corporate Presentation April 2024
Nicola Mining Inc. Corporate Presentation April 2024
 
Q1 Quarterly Update - April 16, 2024.pdf
Q1 Quarterly Update - April 16, 2024.pdfQ1 Quarterly Update - April 16, 2024.pdf
Q1 Quarterly Update - April 16, 2024.pdf
 
young call girls in Yamuna Vihar 🔝 9953056974 🔝 Delhi escort Service
young  call girls in   Yamuna Vihar 🔝 9953056974 🔝 Delhi escort Serviceyoung  call girls in   Yamuna Vihar 🔝 9953056974 🔝 Delhi escort Service
young call girls in Yamuna Vihar 🔝 9953056974 🔝 Delhi escort Service
 

HOW TO FIND A FIXED POINT IN SHUFFLE EFFICIENTLY

  • 1. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.1, January 2013 HOW TO FIND A FIXED POINT IN SHUFFLE EFFICIENTLY Mikako Kageshima1 and ManabuOkamoto1 1 Kanagawa Institute of Technology, Kanagawa, Japan manabu@nw.kanagawa-it.ac.jp ABSTRACT In electronic voting or whistle blowing, anonymity is necessary. Shuffling is a network security technique that makes the information sender anonymous. We use the concept of shuffling in internet-based lotteries, mental poker, E-commerce systems, and Mix-Net. However, if the shuffling is unjust, the anonymity, privacy, or fairness may be compromised. In this paper, we propose the method for confirming fair mixing by finding a fixed point in the mix system and we can keep the details on ‘how to shuffle’ secret. This method requires only two steps and is efficient. KEYWORDS Network Security, Protocol, Privacy, Mix 1. INTRODUCTION Mix-Net [1][2] is a key technique for maintaining anonymity and privacy in electronic voting[3][4]. Mix-Net servers shuffle encrypted messages in order to maintain the privacy of voters. Therefore, ‘how to shuffle’ is an important subject. However, thus far, ‘how to shuffle’ is in a black-box wherein it is not discussed whether the shuffle was mixed fairly. We use the concept of shuffling in internet-based lotteries [5], mental poker [6], E-commerce systems [7], and Mix-Net. However, if the shuffling is unjust, it is reflected on the outcome, and the anonymity, privacy, or fairness may be compromised. In this study, we will propose a method to confirm fair mixing of information. In order to confirm this condition, we will attempt to find fixed points in the mix. If there are no fixed points in the mix, we can declare that the mix was performed well and fairly. A method to confirm fair mixing was proposed by us in [8]. However, this method required many procedural steps to achieve the correct result. Additionally, the mix would not be fair if these steps were performed only once; hence, the same steps had to be performed repeatedly. This proved to be cumbersome. In this study, we propose the complete method for confirming fair mixing by finding a fixed point in the mix system and we can keep the details on ‘how to shuffle’ secret. This method requires only two steps and is efficient. This method needs to be performed only once to get correct results. 2. FAIR MIXING Mix-Net [1] is a technique for maintaining privacy in electronic voting. Mix-Net is used for making the identity of voters anonymous. Mix-Net servers shuffle information so that its users become anonymous. Plural Mix-Net servers shuffle encrypted messages in order to maintain the privacy of voters, and they are safe unless all servers conspire. DOI : 10.5121/ijnsa.2013.5104 51
  • 2. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.1, January 2013 How the shuffle is performed is the key to anonymity. If Mix-Net servers do not shuffle well, the user identities are not anonymous. However, thus far, it has not been discussed whether the algorithm mixes fairly. In this paper, we will propose a method for confirming fair mixing. To confirm this condition, we will attempt to find fixed points in the mix. If there are no fixed points in the mix, we can declare that the mix was performed well and fairly. What is “mix well”? What is “fixed point”? Imagine a card game and a shuffle by the dealer. Assume that before the mix, the cards are {1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13}. (1) After the cards are shuffled by the dealer, they are {1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13}, (2) this shuffle is ‘not mixed at all’. If we have {1, 3, 2, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13}, (3) this shuffle is also ‘not mixed well’. In the shuffle above, only 2 and 3 are swapped. If we have {1, 3, 2, 7, 6, 5, 8, 13, 12, 9, 10, 11,4}, (4) this shuffle is almost mixed well but it is ‘not mixed completely.’ In this shuffle, 1 is in the same position before and after the shuffle. This 1 is known as the “fixed point.” This example contains only one fixed point. We can characterize a mix as ‘not mixed completely’ when there is even a single fixed point. Conversely, we define that when there are no fixed points in the shuffle, the mix is ‘mixed well completely.’ In this paper, we will propose a method to confirm whether a mix is ‘mixed well completely.’ In the method, we ascertain whether there are any fixed points in the mix. As described above, when we have no fixed point, the mix is ‘mixed well completely.’ 3. RELATED WORK AND OUR GOAL Thus far, ‘how to shuffle well’ has not been discussed. First, in [8], we had proposed a similar method. However, in that system, we have to do test repeatedly because it may be wrong if only once. When the test result is “we have fixed point,” there may actually be no fixed point. The probability of this error is 1/N, when N is number of cards. To reduce this probability, we need to repeat the test. Hence, this method is not efficient. In the new scheme presented in this paper, the probability of an error approaches zero. Hence, we need to perform the procedure only once to confirm the shuffle. Thus, this method is simple and efficient. Our goal is to obtain a method to confirm whether the mix is ‘mixed well completely.’ However, we can confirm only whether fixed points exist, and we can keep the details on ‘how to shuffle’ secret. In addition, we focus on only fixed points in the mix system. Hence, we will not delve into the details of the mix system in examples, such as a card game or a Mix-Net. 4. PROPOSED METHOD We assume that a network consists of mix servers, which are placed in line, and these servers shuffle messages in turn. This system is the same as Mix-Net. We denote the servers that shuffle as T1, T2,…,TM, where M is the number of servers. Each mix server shuffles N messages from the previous server and sends them to the next server. 52
  • 3. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.1, January 2013 Each mix server Tl has three functions: (1) a permutation function π, (2) an encrypt function E, and (3) a decrypt function D. The permutation function is denoted as ߨ௟ ሺ݅ሻ ൌ ݆, which means that the mix servers Tl change position i for position j. The encrypt function is denoted as E (P:k), where P is plain text and the encrypt key is k. The decrypt function is denoted as D (C:k), where C is the encrypted message and the decrypt key is k. Additionally, the encrypt and decrypt function must be commutative. Commutative means that for any plain text P and any keys k1, k2, E (P:k1,k2) = E (P:k2,k1). (5) Both the encrypt key and the decrypt key must be secret. We illustrate the whole system in Figure 1. In this figure, we have three mix servers and three messages. {a1, a2, a3} is shuffled through all the servers and this mix system generates an output {a1,a3, a2}. This system has one fixed point a1. Hence, it is ‘not mixed well.’ A ‘tester’ generates test values such as {a1, a2, a3} and initiates the test, as shown in Figure 1.The tester also has an encrypt and decrypt function. These encrypt and decrypt functions must be commutative with each other as well as with the functions of the mix servers. Additionally, all the encrypt keys and decrypt keys of the tester must remain secret. Figure 1. Mix system We describe the procedure for confirming fixed points in this system. We require two turns to complete the procedure. The tester needs to generate N test values and Nencrypt and decrypt keys. ଴ We denote the encrypt keys of the tester with ݇௜ ( i=1,2,…,N ). The initial test value is defined as J = {a1,a2,…,aN} ai : any integer (6) The tester encrypts each test value ai with a corresponding key ݇௜଴ (i=1,2,…,N) and sends them to the mix server T1. Each mix server Tl receives the test values from the tester or the previous mix server, shuffles them, and encrypts each test value with a corresponding key in turn 1. Each mix server Tl has N encrypt and decrypt keys. They must be secret and the encrypt and decrypt functions must be commutative with each other. The resultant values of turn 1 are returned to the tester, which uses them as the input value in turn 2. In turn 2, each mix server performs a similar procedure; each mix server shuffles and decrypts the test values. We proceed to describe these turns in detail. < Turn 1 > The tester encrypts each element of the initial test value J using the public key ݇௜଴ . Subsequently, the tester sends the encrypted values to T1. ଴ ଴ ଴ {E (a1 : ݇ଵ ), E (a2: ݇ଶ ),…, E (aN: ݇ே )}. (7) 53
  • 4. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.1, January 2013 ଵ T1 shuffles these values and encrypts them using the secret encrypt keys {݇௜ } (i=1,2,…,N). Then, T1 send the resultant values to T2. The values that T1 will send are ଴ ଵ {…., E (ai:݇௜ ,݇ሺగଵሺ௜ሻሻ ,…)}. (8) T2 also shuffles these test values and encrypts them using the secret keys {݇௜ଶ }. Then, T2 send the final values to T3. They are ଴ ଵ ଶ {…., E (ai:݇௜ ,݇ሺగଵሺ௜ሻሻ ,݇గଶሺగଵሺ௜ሻሻ ,…)}. (9) The mix servers that follow perform the same procedure. The values sent by the last server TM back to T1 is ଴ ଵ ଶ Y1= {…, E (ai:݇௜ ,݇ሺగଵሺ௜ሻሻ ,݇గଶሺగଵሺ௜ሻሻ , ெ …, ݇஠ெ ሺ ஠ெିଵ ሺ ஠ெିଶ ሺ …ሺ஠ଷሺ஠ଶሺ஠ଵሺ௜ ሻ… ሻ ),…)}. (10) Y1 is the result of turn 1. < Turn 2> The procedure followed in turn 2 is similar to that in turn 1.In turn 1, we use the initial test value J; however, in turn 2, we use Y1 as the initial value. In turn 1, we encrypted the elements; in turn 2, we decrypt these elements. TM sends Y1 to T1. T1 shuffles Y1 in the same manner as that in turn 1 and decrypts each element of Y1. Subsequently, T1 send them to T2. The mix servers that follow perform the same action. They shuffle and decrypt the elements. The last server TM sends the decrypted elements back to the tester. The tester also decrypts these to obtain Y2. Y2 is the result of turn 2. The tester can compare J with Y2 and find fixed points. If we have the same value at its original position, it is a fixed point. When we have J = {a1, a2,…,aN} (11) Y2 = {y21, y22,….,y2N}, (12) and there exists i such that ai= y2i, (13) then this is a fixed point. Thus, the test is completed. If an element is a fixed point, that element must go through the same route, both in turn 1 and in turn 2. In this case, the encrypt keys, which the mix servers use in turn 1, match all the decrypt keys, which mix servers use in turn 2. Thus, the fixed points are restored to their initial values. 5. SAMPLE EXAMPLE We describe this process using a simple example wherein the number of mix servers and the number of messages for shuffling are manageably small. We have three mix servers and three messages, similar to the example in Figure 1. In this example, we have one fixed point, which is the first element. 54
  • 5. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.1, January 2013 < Turn 1 > 1) The tester generates the initial test value J. J = {a1, a2, a3} (14) 2) Each element of J is encrypted with {݇௜଴ } (i = 1, 2, 3) by the tester, and these elements are sent to T1. {݇௜଴ } are the encrypt keys of the tester. ଴ E (a1:݇ଵ ) (15-1) ଴ E (a2:݇ଶ ) (15-2) ଴ E (a3:݇ଷ ) (15-3) 3) T1 receives the test values from the tester and shuffles them using ߨଵ . ߨଵ is a function to shuffle elements. ߨଵ ሺ1ሻ ൌ 2 (16-1) ߨଵ ሺ2ሻ ൌ 3 (16-2) ߨଵ ሺ3ሻ ൌ 1 (16-3) ଵ ଵ 4) Each shuffled element is encrypted with {݇௜ } by T1, and the results are sent to T2. {݇௜ ሽ are the encrypt keys of T1. Note that, after the shuffle, the positions of the elements are changed. ଴ ଵ E (a3:݇ଷ ,݇ଵ ) (17-3) ଴ ଵ E (a1:݇ଵ ,݇ଶ ) (17-1) ଴ ଵ E (a2:݇ଶ ,݇ଷ ) (17-2) 5) T2 shuffles the encrypted elements using ߨଶ . ߨଶ is a function to shuffle elements. ߨଶ ሺ1ሻ ൌ 3 (18-1) ߨଶ ሺ2ሻ ൌ 2 (18-2) ߨଶ ሺ3ሻ ൌ 1 (18-3) 6) Each shuffled element is encrypted with {݇௜ଶ } by T2, and this is sent to T3. {݇௜ ሽ are the ଶ encrypt keys of T2. ଴ ଵ ଶ E (a2:݇ଶ ,݇ଷ ,݇ଵ ) (19-1) ଴ ଵ ଶ E (a1:݇ଵ ,݇ଶ ,݇ଶ ) (19-2) ଴ ଵ ଶ E (a3:݇ଷ ,݇ଵ ,݇ଷ ) (19-3) 7) T3 shuffles the encrypted elements using ߨଷ . ߨଷ is a function to shuffle elements. ߨଷ ሺ1ሻ ൌ 3 (20-1) ߨଷ ሺ2ሻ ൌ 1 (20-2) ߨଷ ሺ3ሻ ൌ 2 (20-3) ଷ ଷ 8) Each shuffled element is encrypted with {݇௜ } by T3. {݇௜ } are the encrypt keys of T3. ଴ ଵ ଶ ଷ E (a1:݇ଵ ,݇ଶ ,݇ଶ ,݇ଵ ) (21-1) ଴ ଵ ଶ ଷ E (a3:݇ଷ ,݇ଵ ,݇ଷ ,݇ଶ ) (21-3) ଴ ଵ ଶ ଷ E (a2:݇ଶ ,݇ଷ ,݇ଵ ,݇ଷ ) (21-2) Turn 1 is completed and the values obtained above are the results of turn 1. 55
  • 6. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.1, January 2013 < Turn 2 > Turn 2 is similar to turn 1.We use an initial test value in turn 1; however, in turn 2 we use the resultant values of turn 1 as the initial test value. In turn 1, we encrypt the elements; in turn 2, we decrypt these elements. 1) T3 sends the results of turn 1 to T1. 2) T1 shuffles them using ߨଵ ሺ1ሻ ൌ 2 (22-1) ߨଵ ሺ2ሻ ൌ 3 (22-2) ߨଵ ሺ3ሻ ൌ 1 (22-3) 3) Each shuffled element is decrypted with a decrypt key corresponding to the encrypt key ଵ ୨ {݇௜ }. Here,for convenience in explanation, we use the same term ቄ݇௜ ቅ to denote the encrypt and the decrypt keys. The following results are sent to T2. ଴ ଵ ଶ ଷ ଵ D (E (a3:݇ଷ ,݇ଵ ,݇ଷ ,݇ଶ ):݇ଷ ) (23-1) ଴ ଵ ଶ ଷ ଵ D (E (a1:݇ଵ ,݇ଶ ,݇ଶ ,݇ଵ ):݇ଶ ) (23-2) ଴ ଵ ଶ ଷ ଵ D (E (a2:݇ଶ ,݇ଷ ,݇ଵ ,݇ଷ ):݇ଵ ) (23-3) 4) T2 shuffles them using ߨଶ ሺ1ሻ ൌ 3 (24-1) ߨଶ ሺ2ሻ ൌ 2 (24-2) ߨଶ ሺ3ሻ ൌ 1 (24-3) ଶ 5) Each shuffled element is decrypted with {݇௜ } by T2and the following results are sent to T3. ଴ ଵ ଶ ଷ ଵ ଶ D (E (a2:݇ଶ ,݇ଷ ,݇ଵ ,݇ଷ ):݇ଵ ,݇ଷ ) (25-1) ଴ ଵ ଶ ଷ ଵ ଶ D (E (a1:݇ଵ ,݇ଶ ,݇ଶ ,݇ଵ ):݇ଶ ,݇ଶ ) (25-2) ଴ ଵ ଶ ଷ ଵ ଶ D (E (a3:݇ଷ ,݇ଵ ,݇ଷ ,݇ଶ ):݇ଷ ,݇ଵ ) (25-3) 6) T2 shuffles them using ߨଷ ሺ1ሻ ൌ 3 (26-1) ߨଷ ሺ2ሻ ൌ 1 (26-2) ߨଷ ሺ3ሻ ൌ 2 (26-3) ଷ 7) Each shuffled element is decrypted with {݇௜ } by T3and the following results are sent back to the tester. ଴ ଵ ଶ ଷ ଵ ଶ ଷ D (E (a1:݇ଵ ,݇ଶ ,݇ଶ ,݇ଵ ):݇ଶ ,݇ଶ ,݇ଵ ) (27-1) ଴ ଵ ଶ ଷ ଵ ଶ ଷ D (E (a3:݇ଷ ,݇ଵ ,݇ଷ ,݇ଶ ):݇ଷ ,݇ଵ ,݇ଷ ) (27-2) ଴ ଵ ଶ ଷ ଵ ଶ ଷ D (E (a2:݇ଶ ,݇ଷ ,݇ଵ ,݇ଷ ):݇ଵ ,݇ଷ ,݇ଶ ) (27-3) ଴ 8) Each shuffled element is decrypted with {݇௜ } by the tester. ଴ ଵ ଶ ଷ ଵ ଶ ଷ ଴ D (E (a1:݇ଵ ,݇ଶ ,݇ଶ ,݇ଵ ):݇ଶ ,݇ଶ ,݇ଵ ,݇ଵ ) = a1 (28-1) ଴ ଵ ଶ ଷ ଵ ଶ ଷ ଴ D (E (a3:݇ଷ ,݇ଵ ,݇ଷ ,݇ଶ ):݇ଷ ,݇ଵ ,݇ଷ ,݇ଷ ) (28-2) ଴ ଵ ଶ ଷ ଵ ଶ ଷ ଴ D (E (a2:݇ଶ ,݇ଷ ,݇ଵ ,݇ଷ ):݇ଵ ,݇ଷ ,݇ଶ ,݇ଶ ) (28-3) 9) The tester obtains the result of the decryption. The tester can compare (14) with (28-1,2,3) and find fixed points. If we have the same value at its original position, it is a fixed point. In 56
  • 7. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.1, January 2013 this example, we have one fixed point, which is the first element a1. Figure 2 illustrates this example. If an element is a fixed point, that element must go through the same route, both in turn 1 and in turn 2. In this case, element a1 goes through the same route in turn 1 and in turn 2.As all the ଴ ଵ ଶ ଷ encrypt keys {݇ଵ , ݇ଶ , ݇ଶ , ݇ଵ }, which the mix servers use in turn 1, match all the decrypt ଴ ଵ ଶ ଷ keys{݇ଵ , ݇ଶ , ݇ଶ , ݇ଵ }, which mix servers use in turn 2,the fixed point is restored to its initial values. Turn1 T1 T2 T3 k0 1 k3 a1 1 k1 2 k2 2 Turn2 T1 T2 T3 0 k3 k 1 1 a1 k1 2 k2 2 Figure 2. Example 6. SECURITY ANALYSIS In this chapter, we discuss the security analysis of our scheme. However, we only focus on attacks that attempt to infer the path of the messages using the test results. We do not include other types of attacks, such as the simple sabotage without the profit, in our discussion. First, we assume that all mix servers are fair. The attacker (may include a tester) attempts to infer the permutation of each mix server using only the result value. If the tester is a attacker, the tester can use any initial value to perpetrate the attack. The attacker attempts to chase the test value by comparing the input with the output of the mix servers in order to infer the permutation. However, the encrypt keys, with which the input values are encrypted, are not known by the perpetrator as the keys are not public. This implies that an attacker cannot chase an element using only the test values as these values are encrypted at the output. If the difference between the maximum and the minimum value of the input is large, for example {10000000, 2, 3,…}, the old scheme [8] is problematic. However, in the new scheme proposed in this paper, we encrypt the values. When we encrypt them, we use ‘modulo’ like RSA and the difference in the sizes of the test values is rendered meaningless. Next, we assume an attack by only one malicious mix server. However, a single mix server can hardly attack alone because the other mix servers shuffle and encrypt values using individual secret keys, hence the values cannot be chased. 57
  • 8. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.1, January 2013 Finally, we assume that the fair mix server S, between unjust mix servers P and Q, is attacked, and the attackers conspire to infer the permutation of the fair server S. In turn 1, P send test value U to S, and Q obtains an output V from S. They use this V in turn 2. P sends V to S as the input in turn 2 and Q obtains output W from S. The result of the test in the complete mix system becomes erroneous because the malicious servers discard the real values. Figure 3 shows this attack. Figure 3.Attack from both side. P and Q infer the permutation of S by comparing U with W. If there is a value at the same position between U and W, the malicious servers can identify the fixed point of the permutation of the mix server S. P and Q cannot know the permutation of the entire mix system; however, this is a leak of a subset of the permutation in the mix system. This results in a breach of anonymity. We can prevent this by checking whether the output V and input V on S are the same. But unjust mix servers P and Q generate V’ from V by encryption, and different values can be generated for the same input value. V’ can be used for injustice. The fixed points can be identified by obtaining W’ from V’ via server S and converting it back to W. To prevent this type of attack, we can add a new process. All mix servers T1, T2,…,TM have keys pi and qi of commutative function such that when a is plain text D (E (a:p1, p2, p3,…, pM): q1, q2, q3,…, qM) = a. (29) However, basically, D (E (a:pi):qi)is not equal to a. In other words, key pi is not corresponding to key qi. We can create these keys in a manner such that on public encrypt systems E and D, when the public keys are{p1, p2, p3,…,pM}, the private keys are {q1, q2, q3,…, qM}. In turn 1, each mix server Ti encrypts values using pi, and in turn 2 they are decrypted using qi. By the addition of this procedure in the example shown in figure 3, malicious mix servers P and Q cannot find the fixed points because all {p1, p2, p3,…pM} and {q1,q2,q3,…qM} are necessary to erase all encryption. If at least two or more mix servers do not join in a malicious attack, injustice does not occur. 58
  • 9. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.1, January 2013 7. CONCLUSION In this paper, we proposed a method to find fixed points in a mix system without reviewing shuffling. The probability of an error using this method approaches zero. Hence, the procedure needs to be performed only once to obtain optimal results. REFERENCES [1] D. Chaum, (1981) “Untraceable Electronic Mail, Return Address, and Digital Pseudonyms,” Communications of the ACM, Vol. 24, No. 2, pp.84-88, 2. [2] Kun Peng, (2011) “Failure of a Mix Network”, International Journal of Network Security & Its Applications (IJNSA), Vol. 3, No. 1, 1. [3] M. Okamoto & Y. Tanaka, (2006) “Secret Information Distribution,” The Transactions of the Institute of Electronics, Information and Communication Engineers, A J89-A (8), pp.662-670. [4] M. Okamoto, (2011) “A Multiple Ballots Election Scheme Using Anonymous Distribution,” International Journal of Network Security & Its Applications (IJNSA), Vol. 3, No. 5, 9. [5] B. Schneier, (1996) “Applied Cryptography,” John Wiley & Sons. [6] A. Shimir, R. Rivest, & L. Adleman, (1981) “Mental Poker,” The Mathematical Gardner, Wadsworth International, California, pp.37-43. [7] H. Jayasree& A. Damodaram, (2012) “A Novel Fair Anonymous Contract Signing Protocol for E-Commerce Applications,” International Journal of Network Security & Its Applications (IJNSA), Vol. 4, No. 59. [8] M. Kageshima, M. Okamoto, (2011) “How to find a Fixed point in a Mix System,” TENCON 2011-2011 IEEE Region 10 Conference, Bali, Indonesia11. Authors MikakoKageshima She is a student at Kanagawa Institute of Technology. Manabu Okamoto He received B.S. and M.S. degrees in Mathematics from Waseda University in 1995 and 1997, respectively. In 2010, he received a doctoral degree in the field of Global Information and Telecommunication from Waseda University. He is now an Associate Professor at Kanagawa Institute of Technology. 59