{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T07:58:10Z","timestamp":1772006290502,"version":"3.50.1"},"reference-count":52,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2443589"],"award-info":[{"award-number":["2443589"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,8]]},"DOI":"10.1109\/acsac67867.2025.00088","type":"proceedings-article","created":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T20:54:58Z","timestamp":1771966498000},"page":"1097-1110","source":"Crossref","is-referenced-by-count":0,"title":["End-to-End Encrypted Applications with Strong Consistency Under Byzantine Actors"],"prefix":"10.1109","author":[{"given":"Natalie","family":"Popescu","sequence":"first","affiliation":[{"name":"Princeton University,Princeton,New Jersey,USA"}]},{"given":"Shai","family":"Caspin","sequence":"additional","affiliation":[{"name":"Princeton University,Princeton,New Jersey,USA"}]},{"given":"Leon","family":"Schuermann","sequence":"additional","affiliation":[{"name":"Princeton University,Princeton,New Jersey,USA"}]},{"given":"Jingyuan","family":"Chen","sequence":"additional","affiliation":[{"name":"Princeton University,Princeton,New Jersey,USA"}]},{"given":"Amit","family":"Levy","sequence":"additional","affiliation":[{"name":"Princeton University,Princeton,New Jersey,USA"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Part 164-Security and Privacy"},{"key":"ref2","article-title":"Blockstack: A global naming and storage system secured by blockchains","volume-title":"2016 USENIX annual technical conference (USENIX ATC 16)","author":"Ali"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-009-9040-7"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0061"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-38551-3_12","article-title":"On active attack detection in messaging with immediate decryption","volume-title":"Cryptology ePrint Archive, Paper 2023\/880","author":"Barooti","year":"2023"},{"key":"ref6","volume-title":"Modern Web Development on the JAMstack","author":"Biilmann","year":"2019"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/128738.128742"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363202"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.56553\/popets-2022-0087","article-title":"Organ: Organizational anonymity with low latency","volume-title":"Cryptology ePrint Archive, Paper 2022\/488","author":"Das","year":"2022"},{"key":"ref10","first-page":"325","article-title":"Scalog: Seamless reconfiguration and total order in a scalable shared log","volume-title":"17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20)","author":"Ding"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"ref12","article-title":"SPORC: Group collaboration using untrusted cloud resources","volume-title":"9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10)","author":"Feldman"},{"key":"ref13","volume-title":"Secure messaging with crypho","author":"Kulild Fredheim","year":"2020"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-15801"},{"key":"ref15","volume-title":"messages out of order","author":"Gobaud","year":"2018"},{"key":"ref16","first-page":"851","article-title":"Ghostor: Toward a secure {Data-Sharing} system from decentralized trust","volume-title":"17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20)","author":"Hu"},{"issue":"4","key":"ref17","first-page":"51","article-title":"Paxos made simple","volume":"32","author":"Lamport","year":"2001","journal-title":"ACM SIGACT News (Distributed Computing Column)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.21236\/ada445862"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3209280.3209535"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2063509.2063512"},{"key":"ref21","article-title":"Secure history preservation through timeline entanglement","volume-title":"11th USENIX Security Symposium (USENIX Security 02)","author":"Maniatis"},{"key":"ref22","volume-title":"Private group messaging","author":"Marlinspike","year":"2014"},{"key":"ref23","year":"2022","journal-title":"End-to-end encryption implementation guide"},{"key":"ref24","volume-title":"Messages not shown in the right order","year":"2022"},{"key":"ref25","volume-title":"The double ratchet algorithm","author":"Perrin","year":"2016"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043566"},{"key":"ref27","volume-title":"Redis pub\/sub"},{"key":"ref28","article-title":"Solid: a platform for decentralized social applications based on linked data","author":"Vlad Sambra","year":"2016","journal-title":"MIT CSAIL & Qatar Computing Research Institute, Tech. Rep."},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3338498.3358644"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0027"},{"key":"ref31","volume-title":"Firebase","year":"2023"},{"key":"ref32","volume-title":"Health Privacy Overview","year":"2023"},{"key":"ref33","volume-title":"Keybase","year":"2023"},{"key":"ref34","volume-title":"Matrix","year":"2023"},{"key":"ref35","volume-title":"PreVeil","year":"2023"},{"key":"ref36","volume-title":"ProtonMail","year":"2023"},{"key":"ref37","volume-title":"Signal","year":"2023"},{"key":"ref38","volume-title":"Threema","year":"2023"},{"key":"ref39","volume-title":"Tresorit","year":"2023"},{"key":"ref40","volume-title":"Virtru","year":"2023"},{"key":"ref41","volume-title":"WhatsApp","year":"2023"},{"key":"ref42","volume-title":"Wire","year":"2023"},{"key":"ref43","journal-title":"Telegram"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/224056.224070"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132783"},{"key":"ref46","volume-title":"Missing messages","year":"2023"},{"key":"ref47","volume-title":"Missing messages on ios","year":"2023"},{"key":"ref48","volume-title":"Some messages missing on mobile only?","year":"2021"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.22"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815417"},{"key":"ref51","volume-title":"Html living standard","year":"2023"},{"key":"ref52","volume-title":"Messages send in incorrect order (attempting with no connectivity, then regaining connectivity)","author":"Williams","year":"2022"}],"event":{"name":"2025 IEEE Annual Computer Security Applications Conference (ACSAC)","location":"Honolulu, HI, USA","start":{"date-parts":[[2025,12,8]]},"end":{"date-parts":[[2025,12,12]]}},"container-title":["2025 IEEE Annual Computer Security Applications Conference (ACSAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11391636\/11391706\/11392060.pdf?arnumber=11392060","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T07:01:22Z","timestamp":1772002882000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11392060\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,8]]},"references-count":52,"URL":"https:\/\/doi.org\/10.1109\/acsac67867.2025.00088","relation":{},"subject":[],"published":{"date-parts":[[2025,12,8]]}}}