Jump to content

Mix network

From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by Qu3a (talk | contribs) at 12:18, 2 July 2010 (interwiki pl). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.
File:Decryption mix net.png
Simple decryption mix net. Messages are encrypted under a sequence of public keys. Each mix node removes a layer of encryption using its own private key. The node shuffles the message order, and transmits the result to the next node.

Digital mixes (also known as mix networks) were invented by David Chaum in the early 1980s. Digital mixes create hard-to-trace communications by using a chain of proxy servers. Each message is encrypted to each proxy using public key cryptography; the resulting encryption is layered like a Russian doll (except that each "doll" is of the same size) with the message as the innermost layer. Each proxy server strips off its own layer of encryption to reveal where to send the message next. If all but one of the proxy servers are compromised by the tracer, untraceability can still be achieved against some weaker adversaries.

Some anonymous remailers (such as Mixmaster) and onion routing (including Tor) are based on this idea.

There is another kind of mix net that consists of re-encryption operations. In these mixnets each mix node re-encrypts the set of received messages and the decryption is done in a single step. Homomorphic encryption schemes allow that.