B Adida, D Wikström - Proceedings of the 4th conference on Theory of …, 2007 - dl.acm.org
We show how to obfuscate a secret shuffle of ciphertexts: shuffling becomes a public
operation. Given a trusted party that samples and obfuscates a shuffle before any ciphertexts …