{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T14:40:29Z","timestamp":1773931229194,"version":"3.50.1"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031182822","type":"print"},{"value":"9783031182839","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-18283-9_7","type":"book-chapter","created":{"date-parts":[[2022,10,21]],"date-time":"2022-10-21T20:23:03Z","timestamp":1666383783000},"page":"123-148","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["The Effect of\u00a0False Positives: Why Fuzzy Message Detection Leads to\u00a0Fuzzy Privacy Guarantees?"],"prefix":"10.1007","author":[{"given":"Istv\u00e1n Andr\u00e1s","family":"Seres","sequence":"first","affiliation":[]},{"given":"Bal\u00e1zs","family":"Pej\u00f3","sequence":"additional","affiliation":[]},{"given":"P\u00e9ter","family":"Burcsi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,22]]},"reference":[{"issue":"4","key":"7_CR1","doi-asserted-by":"publisher","first-page":"1602","DOI":"10.1137\/070680096","volume":"38","author":"E Anshelevich","year":"2008","unstructured":"Anshelevich, E., Dasgupta, A., Kleinberg, J., Tardos, E., Wexler, T., Roughgarden, T.: The price of stability for network design with fair cost allocation. SIAM J. Comput. 38(4), 1602\u20131623 (2008)","journal-title":"SIAM J. Comput."},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Backes, M., Kate, A., Manoharan, P., Meiser, S., Mohammadi, E.: AnoA: a framework for analyzing anonymous communication protocols. In: 2013 IEEE 26th Computer Security Foundations Symposium, pp. 163\u2013178. IEEE (2013)","DOI":"10.1109\/CSF.2013.18"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Beck, G., Len, J., Miers, I., Green, M.: Fuzzy message detection. IACR eprint (2021)","DOI":"10.1145\/3460120.3484545"},{"key":"7_CR4","unstructured":"Solomon, M., DiFrancesco, B.: Privacy preserving stealth payments on the Ethereum blockchain (2021)"},{"key":"7_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1007\/978-3-642-33627-0_27","volume-title":"Privacy in Statistical Databases","author":"G Bianchi","year":"2012","unstructured":"Bianchi, G., Bracciale, L., Loreti, P.: \u201cBetter than nothing\u2019\u2019 privacy with bloom filters: to what extent? In: Domingo-Ferrer, J., Tinnirello, I. (eds.) PSD 2012. LNCS, vol. 7556, pp. 348\u2013363. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-33627-0_27"},{"key":"7_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1007\/978-3-642-39884-1_29","volume-title":"Financial Cryptography and Data Security","author":"G Bicz\u00f3k","year":"2013","unstructured":"Bicz\u00f3k, G., Chia, P.H.: Interdependent privacy: let me share your data. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 338\u2013353. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39884-1_29"},{"key":"7_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/978-3-642-39077-7_5","volume-title":"Privacy Enhancing Technologies","author":"K Chatzikokolakis","year":"2013","unstructured":"Chatzikokolakis, K., Andr\u00e9s, M.E., Bordenabe, N.E., Palamidessi, C.: Broadening the scope of differential privacy using metrics. In: De Cristofaro, E., Wright, M. (eds.) PETS 2013. LNCS, vol. 7981, pp. 82\u2013102. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39077-7_5"},{"key":"7_CR8","unstructured":"de Valence, H.: Determine whether penumbra could integrate fuzzy message detection (2021)"},{"key":"7_CR9","first-page":"288","volume":"2","author":"D Desfontaines","year":"2020","unstructured":"Desfontaines, D., Pej\u00f3, B.: SoK: differential privacies. Proc. Priv. Enhanc. Technol. 2, 288\u2013313 (2020)","journal-title":"Proc. Priv. Enhanc. Technol."},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Domingo-Ferrer, J., Torra, V.: A critique of k-anonymity and some of its enhancements. In: 2008 Third International Conference on Availability, Reliability and Security, pp. 990\u2013993. IEEE (2008)","DOI":"10.1109\/ARES.2008.97"},{"key":"7_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1\u201312. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11787006_1"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Dwork, C.: Differential privacy in new settings. In: Proceedings of the Twenty-First Annual ACM-SIAM Symposium on Discrete Algorithms. SIAM (2010)","DOI":"10.1137\/1.9781611973075.16"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Dwork, C., Naor, M., Pitassi, T., Rothblum, G.N.: Differential privacy under continual observation. In: Proceedings of the Forty-Second ACM Symposium on Theory of Computing. ACM (2010)","DOI":"10.1145\/1806689.1806787"},{"key":"7_CR14","unstructured":"Dwork, C., Naor, M., Pitassi, T., Rothblum, G.N., Yekhanin, S.: Pan-private streaming algorithms. In: ICS (2010)"},{"issue":"3859","key":"7_CR15","doi-asserted-by":"publisher","first-page":"1243","DOI":"10.1126\/science.162.3859.1243","volume":"162","author":"G Hardin","year":"1968","unstructured":"Hardin, G.: The tragedy of the commons: the population problem has no technical solution; it requires a fundamental extension in morality. Science 162(3859), 1243\u20131248 (1968)","journal-title":"Science"},{"key":"7_CR16","volume-title":"A General Theory of Equilibrium Selection in Games","author":"JC Harsanyi","year":"1988","unstructured":"Harsanyi, J.C., Selten, R., et al.: A General Theory of Equilibrium Selection in Games. MIT Press, Cambridge (1988)"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Hay, M., Li, C., Miklau, G., Jensen, D.: Accurate estimation of the degree distribution of private networks. In: 2009 Ninth IEEE International Conference on Data Mining, pp. 169\u2013178. IEEE (2009)","DOI":"10.1109\/ICDM.2009.11"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Jorgensen, Z., Yu, T., Cormode, G.: Conservative or liberal? Personalized differential privacy. In: 2015 IEEE 31st International Conference on Data Engineering, pp. 1023\u20131034. IEEE (2015)","DOI":"10.1109\/ICDE.2015.7113353"},{"issue":"12","key":"7_CR19","doi-asserted-by":"publisher","first-page":"1155","DOI":"10.14778\/2732977.2732989","volume":"7","author":"G Kellaris","year":"2014","unstructured":"Kellaris, G., Papadopoulos, S., Xiao, X., Papadias, D.: Differentially private event sequences over infinite streams. Proc. VLDB Endow. 7(12), 1155\u20131166 (2014)","journal-title":"Proc. VLDB Endow."},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Kifer, D., Machanavajjhala, A.: No free lunch in data privacy. In: Proceedings of the 2011 ACM SIGMOD International Conference on Management of Data, pp. 193\u2013204 (2011)","DOI":"10.1145\/1989323.1989345"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Korolova, A., Kenthapadi, K., Mishra, N., Ntoulas, A.: Releasing search queries and clicks privately. In: Proceedings of the 18th International Conference on World Wide Web, pp. 171\u2013180 (2009)","DOI":"10.1145\/1526709.1526733"},{"key":"7_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1007\/3-540-49116-3_38","volume-title":"STACS 99","author":"E Koutsoupias","year":"1999","unstructured":"Koutsoupias, E., Papadimitriou, C.: Worst-case equilibria. In: Meinel, C., Tison, S. (eds.) STACS 1999. LNCS, vol. 1563, pp. 404\u2013413. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-49116-3_38"},{"key":"7_CR23","unstructured":"Lewis, S.J.: Niwl: a prototype system for open, decentralized, metadata resistant communication using fuzzytags and random ejection mixers (2021)"},{"key":"7_CR24","unstructured":"Lewis, S.J.: A playground simulator for fuzzy message detection (2021)"},{"key":"7_CR25","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: $$L$$-diversity: privacy beyond $$k$$-anonymity. ACM Trans. Knowl. Discov. Data (TKDD) 1(1), 3-es (2007)","DOI":"10.1145\/1217299.1217302"},{"issue":"1","key":"7_CR26","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1006\/game.1996.0044","volume":"14","author":"D Monderer","year":"1996","unstructured":"Monderer, D., Shapley, L.S.: Potential games. Games Econ. Behav. 14(1), 124\u2013143 (1996)","journal-title":"Games Econ. Behav."},{"issue":"1","key":"7_CR27","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1073\/pnas.36.1.48","volume":"36","author":"JF Nash","year":"1950","unstructured":"Nash, J.F., et al.: Equilibrium points in $$n$$-person games. Proc. Natl. Acad. Sci. 36(1), 48\u201349 (1950)","journal-title":"Proc. Natl. Acad. Sci."},{"key":"7_CR28","doi-asserted-by":"crossref","unstructured":"Nisan, N., Schapira, M., Valiant, G., Zohar, A.: Best-response mechanisms. In: ICS, pp. 155\u2013165. Citeseer (2011)","DOI":"10.1145\/1993574.1993633"},{"key":"7_CR29","unstructured":"Noether, S.: Ring signature confidential transactions for monero. IACR Cryptology ePrint Archive 2015\/1098 (2015)"},{"issue":"5","key":"7_CR30","doi-asserted-by":"publisher","first-page":"911","DOI":"10.1002\/asi.21015","volume":"60","author":"P Panzarasa","year":"2009","unstructured":"Panzarasa, P., Opsahl, T., Carley, K.M.: Patterns and dynamics of users\u2019 behavior and interaction: network analysis of an online community. J. Am. Soc. Inf. Sci. Technol. 60(5), 911\u2013932 (2009)","journal-title":"J. Am. Soc. Inf. Sci. Technol."},{"key":"7_CR31","doi-asserted-by":"crossref","unstructured":"Paranjape, A., Benson, A.R., Leskovec, J.: Motifs in temporal networks. In: Proceedings of the Tenth ACM International Conference on Web Search and Data Mining, pp. 601\u2013610 (2017)","DOI":"10.1145\/3018661.3018731"},{"key":"7_CR32","unstructured":"Rondelet, A.: Fuzzy message detection in Zeth (2021)"},{"key":"7_CR33","unstructured":"Sasson, E.B., et al.: Zerocash: decentralized anonymous payments from bitcoin. In: 2014 IEEE Symposium on Security and Privacy, pp. 459\u2013474. IEEE (2014)"},{"issue":"2","key":"7_CR34","first-page":"156","volume":"83","author":"HA Simon","year":"1993","unstructured":"Simon, H.A.: Altruism and economics. Am. Econ. Rev. 83(2), 156\u2013161 (1993)","journal-title":"Am. Econ. Rev."},{"key":"7_CR35","doi-asserted-by":"publisher","first-page":"101592","DOI":"10.1016\/j.tele.2021.101592","volume":"61","author":"A Soumelidou","year":"2021","unstructured":"Soumelidou, A., Tsohou, A.: Towards the creation of a profile of the information privacy aware user through a systematic literature review of information privacy awareness. Telematics Inform. 61, 101592 (2021)","journal-title":"Telematics Inform."},{"issue":"05","key":"7_CR36","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(05), 557\u2013570 (2002)","journal-title":"Int. J. Uncertain. Fuzziness Knowl.-Based Syst."},{"key":"7_CR37","doi-asserted-by":"crossref","unstructured":"Takagi, S., Cao, Y., Yoshikawa, M.: Asymmetric differential privacy. arXiv preprint arXiv:2103.00996 (2021)","DOI":"10.1109\/BigData55660.2022.10020709"},{"key":"7_CR38","doi-asserted-by":"crossref","unstructured":"Zhang, T., Zhu, T., Liu, R., Zhou, W.: Correlated data in differential privacy: definition and analysis. Concurr. Comput. Pract. Exp. 34(16), e6015 (2020)","DOI":"10.1002\/cpe.6015"},{"issue":"1","key":"7_CR39","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/s10115-010-0311-2","volume":"28","author":"B Zhou","year":"2011","unstructured":"Zhou, B., Pei, J.: The $$k$$-anonymity and $$l$$-diversity approaches for privacy preservation in social networks against neighborhood attacks. Knowl. Inf. Syst. 28(1), 47\u201377 (2011). https:\/\/doi.org\/10.1007\/s10115-010-0311-2","journal-title":"Knowl. Inf. Syst."}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-18283-9_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,9]],"date-time":"2023-03-09T13:57:24Z","timestamp":1678370244000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-18283-9_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031182822","9783031182839"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-18283-9_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"22 October 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Grenada","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Grenada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 May 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 May 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fc22.ifca.ai\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Hotcrp","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"159","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}