Figure 2. Configuration of LE-based linear Mix-net

From

Linear Mix-net and a Scheme for Collecting Data from Anonymous Data Holders

Shinsuke Tamura, Shuji Taniguchi

Information Security and Computer Fraud. 2014, 2(3), 39-47 doi:10.12691/iscf-2-3-2