{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T02:24:23Z","timestamp":1743128663053,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031514753"},{"type":"electronic","value":"9783031514760"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-51476-0_10","type":"book-chapter","created":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T07:02:29Z","timestamp":1704870149000},"page":"193-211","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Panini \u2014 Anonymous Anycast and\u00a0an\u00a0Instantiation"],"prefix":"10.1007","author":[{"given":"Christoph","family":"Coijanovic","sequence":"first","affiliation":[]},{"given":"Christiane","family":"Weis","sequence":"additional","affiliation":[]},{"given":"Thorsten","family":"Strufe","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,11]]},"reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Backes, M., et al.: AnoA: a framework for analyzing anonymous communication protocols. In: IEEE CSF (2013)","DOI":"10.1109\/CSF.2013.18"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Baldimtsi, F., et al.: Anonymous lottery in the proof-of-stake setting. In: IEEE CSF (2020)","DOI":"10.1109\/CSF49147.2020.00030"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Bellare, M., Desai, A., Pointcheval, D., Rogaway, P.: Relations among notions of security for public-key encryption schemes. In: IACR Cryptol. ePrint Arch. (1998)","DOI":"10.1007\/BFb0055718"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Benhamouda, F., et al.: Can a public blockchain keep a secret? In: TCC (2020)","DOI":"10.1007\/978-3-030-64375-1_10"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Beullens, W., et al.: Calamari and Falafl: logarithmic (linkable) ring signatures from isogenies and lattices. In: IACR Cryptol. ePrint Arch. (2020)","DOI":"10.1007\/978-3-030-64834-3_16"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Campanelli, M., et al.: Encryption to the future: a paradigm for sending secret messages to future (anonymous) committees. IACR Cryptol. ePrint Arch. (2021)","DOI":"10.1007\/978-3-031-22969-5_6"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Cascudo, I., et al.: YOLO YOSO: fast and simple encryption and secret sharing in the YOSO model. In: IACR Cryptology ePrint Archive (2022)","DOI":"10.1007\/978-3-031-22963-3_22"},{"key":"10_CR8","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/3211852.3211855","volume":"48","author":"D Cicalese","year":"2018","unstructured":"Cicalese, D., Rossi, D.: A longitudinal study of IP Anycast. Comput. Commun. Rev. 48, 10\u201318 (2018)","journal-title":"Comput. Commun. Rev."},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Coijanovic, C., et al.: Panini: Anonymous AnyCast and an instantiation (extended version). ArXiv (2023)","DOI":"10.1007\/978-3-031-51476-0_10"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Das, D., et al.: Organ: organizational anonymity with low latency. PoPETs (2022)","DOI":"10.56553\/popets-2022-0087"},{"key":"10_CR11","unstructured":"D\u00edaz, C., et al.: The NYM network the next generation of privacy infrastructure (2021)"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Dingledine, R., et al.: Tor: The second-generation onion router. In: USENIX Security (2004)","DOI":"10.21236\/ADA465464"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"D\u00f6ttling, N., et al.: McFly: verifiable encryption to the future made practical. IACR Cryptol. ePrint Arch. (2022)","DOI":"10.1007\/978-3-031-47754-6_15"},{"key":"10_CR14","unstructured":"Eskandarian, S., et al.: Express: lowering the cost of metadata-hiding communication with cryptographic privacy. In: USENIX Security (2021)"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Ganesh, C., et al.: Proof-of-stake protocols for privacy-aware blockchains. IACR Cryptol. ePrint Arch. (2018)","DOI":"10.1007\/978-3-030-17653-2_23"},{"key":"10_CR16","unstructured":"Gentry, C., et al.: Random-index PIR with applications to large-scale secure MPC. IACR Cryptol. ePrint Arch. (2020)"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Goldwasser, S., Micali, S.: Probabilistic encryption. J. Comput. Syst, Sci (1984)","DOI":"10.1016\/0022-0000(84)90070-9"},{"key":"10_CR18","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S Goldwasser","year":"1988","unstructured":"Goldwasser, S., et al.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput. 17, 281\u2013308 (1988)","journal-title":"SIAM J. Comput."},{"key":"10_CR19","unstructured":"Hevia, A.G., Micciancio, D.: An indistinguishability-based characterization of anonymous channels. In: PETS (2008)"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"van den Hooff, J., et al.: Vuvuzela: scalable private messaging resistant to traffic analysis. In: SOSP (2015)","DOI":"10.1145\/2815400.2815417"},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Kuhn, C., et al.: On privacy notions in anonymous communication. PoPets (2019)","DOI":"10.2478\/popets-2019-0022"},{"key":"10_CR22","doi-asserted-by":"crossref","unstructured":"Langowski, S., et al.: Trellis: Robust and scalable metadata-private anonymous broadcast (2022)","DOI":"10.14722\/ndss.2023.23088"},{"key":"10_CR23","doi-asserted-by":"crossref","unstructured":"Liu, J.K., Wong, D.S.: Linkable ring signatures: Security models and new schemes. In: ICCSA (2005)","DOI":"10.1007\/11424826_65"},{"key":"10_CR24","doi-asserted-by":"crossref","unstructured":"Liu, J.K., et al.: Linkable spontaneous anonymous group signature for ad hoc groups (extended abstract). IACR Cryptol. ePrint Arch. (2004)","DOI":"10.1007\/978-3-540-27800-9_28"},{"key":"10_CR25","doi-asserted-by":"crossref","unstructured":"Lu, X., et al.: Raptor: a practical lattice-based (linkable) ring signature. IACR Cryptol. ePrint Arch. (2018)","DOI":"10.1007\/978-3-030-21568-2_6"},{"key":"10_CR26","doi-asserted-by":"crossref","unstructured":"Mislove, A., et al.: Ap3: cooperative, decentralized anonymous communication. In: EW 11 (2004)","DOI":"10.1145\/1133572.1133578"},{"key":"10_CR27","doi-asserted-by":"crossref","unstructured":"Nassurdine, M., et al.: Identity based linkable ring signature with logarithmic size. In: Inscrypt (2021)","DOI":"10.1007\/978-3-030-88323-2_3"},{"key":"10_CR28","unstructured":"Pfitzmann, A., Hansen, M.: A terminology for talking about privacy by data minimization: anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management (2010)"},{"key":"10_CR29","unstructured":"Piotrowska, A.M., et al.: The loopix anonymity system. ArXiv (2017)"},{"key":"10_CR30","doi-asserted-by":"crossref","unstructured":"Schaad, J., Cellars, A., et al.: Secure\/Multipurpose Internet Mail Extensions (S\/MIME) Version 4.0. RFC 8551, RFC Editor, April 2019","DOI":"10.17487\/RFC8551"},{"key":"10_CR31","doi-asserted-by":"crossref","unstructured":"Vadapalli, A., et al.: Sabre: Sender-anonymous messaging with fast audits. In: IEEE SP (2022)","DOI":"10.1109\/SP46214.2022.9833601"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2023"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-51476-0_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,7]],"date-time":"2024-11-07T20:17:39Z","timestamp":1731010659000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-51476-0_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031514753","9783031514760"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-51476-0_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"11 January 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Hague","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2023.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"478","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"93","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3-4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}