{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T23:02:44Z","timestamp":1773961364477,"version":"3.50.1"},"reference-count":106,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"InnoHK Initiative of the Innovation and Technology Commission of Hong Kong Special Administrative Region Government and in part by the Laboratory for AI-Powered Financial Technologies"},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"crossref","award":["62572243"],"award-info":[{"award-number":["62572243"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"crossref","award":["62202228"],"award-info":[{"award-number":["62202228"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Youth Science and Technology Talents Lifting Project of Jiangsu Association of Science and Technology","award":["JSTJ-2024-163"],"award-info":[{"award-number":["JSTJ-2024-163"]}]},{"name":"Hong Kong Research Grants Council","award":["R1012-21"],"award-info":[{"award-number":["R1012-21"]}]},{"name":"Hong Kong Research Grants Council","award":["RFS2122-1S04"],"award-info":[{"award-number":["RFS2122-1S04"]}]},{"name":"Hong Kong Research Grants Council","award":["C1029-22G"],"award-info":[{"award-number":["C1029-22G"]}]},{"name":"Hong Kong RGC","award":["RFS2425-1S01"],"award-info":[{"award-number":["RFS2425-1S01"]}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"crossref","award":["U2441240"],"award-info":[{"award-number":["U2441240"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"crossref","award":["62441238"],"award-info":[{"award-number":["62441238"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"Ministry of Education Humanities and Social Sciences Project","doi-asserted-by":"publisher","award":["24JDSZ3073"],"award-info":[{"award-number":["24JDSZ3073"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw."],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/ton.2026.3672821","type":"journal-article","created":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T20:35:30Z","timestamp":1773347730000},"page":"4068-4083","source":"Crossref","is-referenced-by-count":0,"title":["Anonymous Messaging Made More Flexible With PingPong"],"prefix":"10.1109","volume":"34","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5702-7181","authenticated-orcid":false,"given":"Peipei","family":"Jiang","sequence":"first","affiliation":[{"name":"School of Cyber Science and Engineering, Wuhan University, Hubei, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-8932-3632","authenticated-orcid":false,"given":"Yihao","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Wuhan University, Hubei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9178-6640","authenticated-orcid":false,"given":"Lei","family":"Xu","sequence":"additional","affiliation":[{"name":"School of Mathematics and Statistics, Nanjing University of Science and Technology, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9881-1180","authenticated-orcid":false,"given":"Wentao","family":"Dong","sequence":"additional","affiliation":[{"name":"Department of Computer Science, City University of Hong Kong, Hong Kong, SAR, China"}]},{"given":"Peiyuan","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Wuhan University, Hubei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6010-2661","authenticated-orcid":false,"given":"Yulong","family":"Ming","sequence":"additional","affiliation":[{"name":"Department of Computer Science, City University of Hong Kong, Hong Kong, SAR, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0547-315X","authenticated-orcid":false,"given":"Cong","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Computer Science, City University of Hong Kong, Hong Kong, SAR, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8702-8302","authenticated-orcid":false,"given":"Xiaohua","family":"Jia","sequence":"additional","affiliation":[{"name":"Department of Computer Science, City University of Hong Kong, Hong Kong, SAR, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8967-8525","authenticated-orcid":false,"given":"Qian","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Wuhan University, Hubei, China"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"We Kill People Based on Metadata","author":"Core","year":"2014"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1508081113"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.21236\/ADA465464"},{"key":"ref4","first-page":"271","article-title":"RAPTOR: Routing attacks on privacy in Tor","volume-title":"Proc. 24th USENIX Secur. Symp. (USENIX Secur.)","author":"Sun"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3338537"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866346"},{"key":"ref7","first-page":"179","article-title":"Dissent in numbers: Making strong anonymity scale","volume-title":"Proc. 10th USENIX Symp. Operating Syst. Design Implement. (OSDI)","author":"Wolinsky"},{"key":"ref8","first-page":"147","article-title":"Proactively accountable anonymous messaging in verdict","volume-title":"Proc. USENIX Secur.","author":"Corrigan-Gibbs"},{"key":"ref9","first-page":"1217","article-title":"MCMix: Anonymous messaging via secure multiparty computation","volume-title":"Proc. USENIX Secur.","author":"Alexopoulos"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815417"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132755"},{"key":"ref12","first-page":"711","article-title":"Karaoke: Distributed private messaging immune to passive traffic analysis","volume-title":"Proc. USENIX OSDI","author":"Lazar"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359648"},{"key":"ref14","first-page":"1199","article-title":"The Loopix anonymity system","volume-title":"Proc. 26th USENIX Security Symp.","author":"Piotrowska"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787491"},{"key":"ref16","first-page":"759","article-title":"XRD: Scalable messaging system with cryptographic privacy","volume-title":"Proc. USENIX NSDI","author":"Kwon"},{"key":"ref17","first-page":"551","article-title":"Unobservable communication over fully untrusted infrastructure","volume-title":"Proc. USENIX OSDI","author":"Angel"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.27"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00062"},{"key":"ref20","first-page":"313","article-title":"Addra: Metadata-private voice communication over fully untrusted infrastructure","volume-title":"Proc. USENIX OSDI","author":"Ahmad"},{"key":"ref21","first-page":"735","article-title":"Groove: Flexible metadata-private messaging","volume-title":"Proc. USENIX OSDI","author":"Barman"},{"key":"ref22","first-page":"877","article-title":"Boomerang: Metadata-private messaging under hardware trust","volume-title":"Proc. USENIX NSDI","author":"Jiang"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3670350"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00065"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2024-0030"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132783"},{"key":"ref27","first-page":"571","article-title":"Alpenhorn: Bootstrapping secure communication without leaking metadata","volume-title":"Proc. 12th USENIX Symp. Operating Syst. Design Implement. (OSDI)","author":"Lazar"},{"key":"ref28","first-page":"1775","article-title":"Express: Lowering the cost of metadata-hiding communication with cryptographic privacy","volume-title":"Proc. 30th USENIX Security Symp.","author":"Eskandarian"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0008"},{"key":"ref30","volume-title":"Technology Preview: Private Contact Discovery for Signal","author":"Marlinspike","year":"2017"},{"key":"ref31","first-page":"3309","article-title":"Private signaling","volume-title":"Proc. USENIX Secur.","author":"Madathil"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484545"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-15802-5_26"},{"key":"ref34","first-page":"145","article-title":"Enhancing security and privacy of Tor\u2019s ecosystem by using trusted execution environments","volume-title":"Proc. USENIX NSDI","author":"Kim"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339814"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3106989.3106994"},{"key":"ref37","first-page":"201","article-title":"SafeBricks: Shielding network functions in the cloud","volume-title":"Proc. 15th USENIX Symp. Networked Syst. Design Implement. (NSDI)","author":"Poddar"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24095"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3477132.3483562"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3447543"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3453930"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0022"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358310"},{"key":"ref44","first-page":"857","article-title":"Sanctum: Minimal hardware extensions for strong software isolation","volume-title":"Proc. 25th USENIX Secur. Symp. (USENIX Secur.)","author":"Costan"},{"key":"ref45","article-title":"Integrating remote attestation with transport layer security","author":"Knauth","year":"2018","journal-title":"arXiv:1801.05863"},{"key":"ref46","volume-title":"Confidential Computing Zoo Repository","year":"2023"},{"key":"ref47","volume-title":"SGX Remote Attenstation Services","year":"2022"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.10"},{"key":"ref49","volume-title":"Mutual Attestation: Why and How","year":"2023"},{"key":"ref50","first-page":"4095","article-title":"MAGE: Mutual attestation for a group of enclaves without trusted third parties","volume-title":"Proc. USENIX Secur.","author":"Chen"},{"key":"ref51","article-title":"Software grand exposure: SGX cache attacks are practical","volume-title":"Proc. WOOT","author":"Brasser"},{"key":"ref52","first-page":"299","article-title":"High-resolution side channels for untrusted operating systems","volume-title":"Proc. USENIX ATC","author":"H\u00e4hnel"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66787-4_4"},{"key":"ref54","first-page":"1041","article-title":"Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution","volume-title":"Proc. USENIX Secur.","author":"Bulck"},{"key":"ref55","first-page":"487","article-title":"An off-chip attack on hardware enclaves via the memory bus","volume-title":"Proc. 29th USENIX Conf. Security Symp.","author":"Lee"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00045"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488368"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560603"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.38"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00057"},{"key":"ref61","first-page":"699","article-title":"VoltPillager: Hardware-based fault injection attacks against Intel SGX Enclaves using the SVID voltage scaling interface","volume-title":"Proc. 30th USENIX Secur. Symp. (USENIX Security)","author":"Chen"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00063"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00020"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00089"},{"key":"ref65","first-page":"703","article-title":"Secret key recovery in a global-scale end-to-end encryption system","volume-title":"Proc. USENIX OSDI","author":"Connell"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/3267323.3268958"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70630-4_3"},{"key":"ref68","first-page":"1","article-title":"A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management","author":"Pfitzmann","year":"2010"},{"key":"ref69","first-page":"619","article-title":"Oblivious multi-party machine learning on trusted processors","volume-title":"Proc. 25th USENIX Secur. Symp.","author":"Ohrimenko"},{"key":"ref70","volume-title":"XGBoost Repository","year":"2020"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/3411501.3419420"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611976014.2"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623133"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/1468075.1468121"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/1989493.1989555"},{"key":"ref76","first-page":"4033","article-title":"Enigmap: External-memory oblivious map for secure enclaves","volume-title":"Proc. USENIX Secur.","author":"Tinoco"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36467-6_9"},{"key":"ref78","article-title":"Adnostic: Privacy preserving targeted advertising","volume-title":"Proc. NDSS","author":"Toubiana"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53644-5_21"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/233551.233553"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28416"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1145\/3566049"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623125"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2018.00087"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516660"},{"key":"ref86","first-page":"415","article-title":"Constants count: Practical improvements to oblivious RAM","volume-title":"Proc. 24th USENIX Secur. Symp. (USENIX Secur.)","author":"Ren"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_23"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-023-09447-5"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1145\/258533.258606"},{"key":"ref90","volume-title":"What Information Does WhatsApp Share With the Meta Companies?","author":"Center","year":"2024"},{"key":"ref91","volume-title":"Azure DCsv3 and DCdsv3-Series Documentation","author":"Azure","year":"2024"},{"key":"ref92","volume-title":"Intel Xeon Scalable Platform Built for Most Sensitive Workloads","year":"2020"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/CSF64896.2025.00035"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0008"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486002"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.23088"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1007\/BF00206326"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417261"},{"key":"ref100","first-page":"229","article-title":"Spectrum: High-bandwidth anonymous broadcast","volume-title":"Proc. USENIX NSDI","author":"Newman"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00115"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3670381"},{"key":"ref103","first-page":"3169","article-title":"PerfOMR: Oblivious message retrieval with reduced communication and computation","volume-title":"Proc. USENIX Secur.","author":"Liu"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-18283-9_7"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45724-2_14"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23239"}],"container-title":["IEEE Transactions on Networking"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10723154\/11317935\/11430522.pdf?arnumber=11430522","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T20:06:14Z","timestamp":1773950774000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11430522\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":106,"URL":"https:\/\/doi.org\/10.1109\/ton.2026.3672821","relation":{},"ISSN":["2998-4157"],"issn-type":[{"value":"2998-4157","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}