Sphinx: A Compact and Provably Secure Mix Format

@article{Danezis2008SphinxAC,
  title={Sphinx: A Compact and Provably Secure Mix Format},
  author={George Danezis and Ian Goldberg},
  journal={2009 30th IEEE Symposium on Security and Privacy},
  year={2008},
  pages={269-282}
}
Sphinx is a cryptographic message format used to relay anonymized messages within a mix network. It is more compact than any comparable scheme, and supports a full set of security features: indistinguishable replies, hiding the path length and relay position, as well as providing unlinkability for each leg of the message's journey over the network. We prove the full cryptographic security of Sphinx in the random oracle model, and we describe how it can be used as an efficient drop-in… CONTINUE READING
Highly Cited
This paper has 73 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 43 extracted citations

Advances in Cryptology – EUROCRYPT 2018

Lecture Notes in Computer Science • 2018
View 12 Excerpts
Highly Influenced

Concurrency and Privacy with Payment-Channel Networks

ACM Conference on Computer and Communications Security • 2017
View 5 Excerpts
Highly Influenced

Improving the Sphinx Mix Network

View 3 Excerpts
Highly Influenced

Onion-AE: Foundations of Nested Encryption

IACR Cryptology ePrint Archive • 2018
View 1 Excerpt

TARANET: Traffic-Analysis Resistant Anonymity at the Network Layer

2018 IEEE European Symposium on Security and Privacy (EuroS&P) • 2018
View 2 Excerpts

An anonymous messaging system for Delay Tolerant Networks

2017 IEEE International Conference on Communications (ICC) • 2017
View 1 Excerpt

73 Citations

01020'10'12'14'16'18
Citations per Year
Semantic Scholar estimates that this publication has 73 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 26 references

Breaking and Provably Fixing Minx

Privacy Enhancing Technologies • 2008
View 12 Excerpts
Highly Influenced

A Formal Treatment of Onion Routing

View 15 Excerpts
Highly Influenced

Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes

IACR Cryptology ePrint Archive • 2002
View 9 Excerpts
Highly Influenced

Stinson . Multicollision Attacks on Some Generalized Sequential Hash Functions

Birgit Pfitzmann, Andreas Pfitzmann
IEEE Transactions on Information Theory • 2007

Bernstein . Curve 25519 : New Diffie - Hellman Speed Records

J. Daniel
Public Key Cryptography • 2006

Curve25519: New Diffie-Hellman Speed Records

Public Key Cryptography • 2006
View 1 Excerpt

Recommendation for Key Management—Part 1: General (Revised)

Elaine Barker, William Barker, William Burr, William Polk, Miles Smid
National Institute of Standards and Technology Special Publication • 2006
View 1 Excerpt

Similar Papers

Loading similar papers…