{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T18:11:57Z","timestamp":1770228717301,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":18,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819608874","type":"print"},{"value":"9789819608881","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T00:00:00Z","timestamp":1733875200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T00:00:00Z","timestamp":1733875200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-0888-1_9","type":"book-chapter","created":{"date-parts":[[2024,12,10]],"date-time":"2024-12-10T09:10:27Z","timestamp":1733821827000},"page":"266-295","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Mild Asymmetric Message Franking: Illegal-Messages-Only and\u00a0Retrospective Content Moderation"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3509-787X","authenticated-orcid":false,"given":"Zhengan","family":"Huang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5780-8463","authenticated-orcid":false,"given":"Junzuo","family":"Lai","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8421-4916","authenticated-orcid":false,"given":"Gongxian","family":"Zeng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4067-8230","authenticated-orcid":false,"given":"Jian","family":"Weng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,11]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Abelson, H., Anderson, R.J., Bellovin, S.M., Benaloh, J., Blaze, M., Diffie, W., Gilmore, J., Green, M., Landau, S., Neumann, P.G., Rivest, R.L., Schiller, J.I., Schneier, B., Specter, M.A., Weitzner, D.J.: Keys under doormats: mandating insecurity by requiring government access to all data and communications. J. Cybersecur. 1(1), 69\u201379 (2015)","DOI":"10.1093\/cybsec\/tyv009"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Bartusek, J., Garg, S., Jain, A., Policharla, G.V.: End-to-end secure messaging with traceability only for illegal content. In: EUROCRYPT 2023. pp. 35\u201366. Springer (2023)","DOI":"10.1007\/978-3-031-30589-4_2"},{"key":"9_CR3","unstructured":"Boneh, D., Shoup, V.: A graduate course in applied cryptography. Draft 0.5 (2020)"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Chaum, D., Pedersen, T.P.: Wallet databases with observers. In: CRYPTO 1992. pp. 89\u2013105. Springer (1992)","DOI":"10.1007\/3-540-48071-4_7"},{"key":"9_CR5","unstructured":"Facebook: Facebook messenger app (2016), https:\/\/www.messenger.com\/"},{"key":"9_CR6","unstructured":"Facebook: Messenger secret conversations technical whitepaper (2016), https:\/\/fbnewsroomus.files.wordpress.com\/2016\/07\/secret_conversations_whitepaper-1.pdf"},{"key":"9_CR7","unstructured":"FBI: Going dark https:\/\/www.fbi.gov\/services\/operational-technology\/going-dark, accessed in January 2024"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Goldwasser, S., Kalai, Y.T., Popa, R.A., Vaikuntanathan, V., Zeldovich, N.: How to run turing machines on encrypted data. In: CRYPTO 2013. pp. 536\u2013553. Springer (2013)","DOI":"10.1007\/978-3-642-40084-1_30"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Green, M., Kaptchuk, G., Van\u00a0Laer, G.: Abuse resistant law enforcement access systems. In: EUROCRYPT 2021. pp. 553\u2013583. Springer (2021)","DOI":"10.1007\/978-3-030-77883-5_19"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Grubbs, P., Lu, J., Ristenpart, T.: Message franking via committing authenticated encryption. In: CRYPTO 2017. pp. 66\u201397. Springer (2017)","DOI":"10.1007\/978-3-319-63697-9_3"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Hofheinz, D., Kiltz, E.: Secure hybrid encryption from weakened key encapsulation. In: CRYPTO 2007. pp. 553\u2013571. Springer (2007)","DOI":"10.1007\/978-3-540-74143-5_31"},{"key":"9_CR12","unstructured":"Issa, R., Alhaddad, N., Varia, M.: Hecate: Abuse reporting in secure messengers with sealed sender. In: USENIX Security 2022. pp. 2335\u20132352 (2022)"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Lai, J., Zeng, G., Huang, Z., Yiu, S.M., Mu, X., Weng, J.: Asymmetric group message franking: Definitions and constructions. In: EUROCRYPT 2023. pp. 67\u201397. Springer (2023)","DOI":"10.1007\/978-3-031-30589-4_3"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Okamoto, T.: An efficient divisible electronic cash scheme. In: CRYPTO 1995. pp. 438\u2013451. Springer (1995)","DOI":"10.1007\/3-540-44750-4_35"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Schnorr, C.: Efficient identification and signatures for smart cards. In: CRYPTO 1989. pp. 239\u2013252. Springer (1989)","DOI":"10.1007\/0-387-34805-0_22"},{"key":"9_CR16","unstructured":"Shacham, H.: A Cramer-Shoup Encryption Scheme from the Linear Assumption and from Progressively Weaker Linear Variants. Cryptology ePrint Archive, Report 2007\/074 (2007)"},{"key":"9_CR17","unstructured":"Tarabay, J.: Australian government passes contentious encryption law. The New York Times (2018)"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Tyagi, N., Grubbs, P., Len, J., Miers, I., Ristenpart, T.: Asymmetric message franking: Content moderation for metadata-private end-to-end encryption. In: CRYPTO 2019. pp. 222\u2013250. Springer (2019)","DOI":"10.1007\/978-3-030-26954-8_8"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 ASIACRYPT 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0888-1_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,10]],"date-time":"2024-12-10T09:36:08Z","timestamp":1733823368000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0888-1_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,11]]},"ISBN":["9789819608874","9789819608881"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0888-1_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,11]]},"assertion":[{"value":"11 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ASIACRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on the Theory and Application of Cryptology and Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kolkata","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"asiacrypt2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/asiacrypt.iacr.org\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}