{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:22:51Z","timestamp":1750306971142,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,11,21]],"date-time":"2013-11-21T00:00:00Z","timestamp":1384992000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["SAFER contract N66001-11-C-4018"],"award-info":[{"award-number":["SAFER contract N66001-11-C-4018"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,11,21]]},"DOI":"10.1145\/2535771.2535798","type":"proceedings-article","created":{"date-parts":[[2013,12,20]],"date-time":"2013-12-20T19:50:52Z","timestamp":1387569052000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Crypto-Book"],"prefix":"10.1145","author":[{"given":"John","family":"Maheswaran","sequence":"first","affiliation":[{"name":"Yale University"}]},{"given":"David Isaac","family":"Wolinsky","sequence":"additional","affiliation":[{"name":"Yale University"}]},{"given":"Bryan","family":"Ford","sequence":"additional","affiliation":[{"name":"Yale University"}]}],"member":"320","published-online":{"date-parts":[[2013,11,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"21st CRYPTO.","author":"Boneh D.","year":"2001","unstructured":"D. Boneh and M. Franklin . Identity-based encryption from the Weil pairing . In 21st CRYPTO. 2001 . D. Boneh and M. Franklin. Identity-based encryption from the Weil pairing. In 21st CRYPTO. 2001."},{"key":"e_1_3_2_1_2_1","volume-title":"CRYPTO","author":"Chaum D.","year":"1982","unstructured":"D. Chaum . Blind signatures for untraceable payments . In CRYPTO , 1982 . D. Chaum. Blind signatures for untraceable payments. In CRYPTO, 1982."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1754868.1754897"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866346"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2009.5350374"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30114-1_21"},{"key":"e_1_3_2_1_7_1","volume-title":"CRYPTO","author":"Desmedt Y.","year":"1987","unstructured":"Y. Desmedt and J.-J. Quisquater . Public-key systems based on the difficulty of tampering (is there a difference between DES and RSA?) . In CRYPTO , 1987 . Y. Desmedt and J.-J. Quisquater. Public-key systems based on the difficulty of tampering (is there a difference between DES and RSA?). In CRYPTO, 1987."},{"key":"e_1_3_2_1_8_1","volume-title":"HotPETs","author":"Dey A.","year":"2010","unstructured":"A. Dey and S. Weis . PseudoID: Enhancing privacy in federated login . HotPETs , 2010 . A. Dey and S. Weis. PseudoID: Enhancing privacy in federated login. HotPETs, 2010."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251396"},{"key":"e_1_3_2_1_10_1","volume-title":"July","author":"Processing Standards Publication Federal Information","year":"2013","unstructured":"Federal Information Processing Standards Publication . Digital signature standard (DSS) , July 2013 . FIPS 186-4. Federal Information Processing Standards Publication. Digital signature standard (DSS), July 2013. FIPS 186-4."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1397735.1397747"},{"key":"e_1_3_2_1_12_1","volume-title":"Apr.","author":"Hammer-Lahav E.","year":"2010","unstructured":"E. Hammer-Lahav . The OAuth 1.0 protocol , Apr. 2010 . RFC 5849. E. Hammer-Lahav. The OAuth 1.0 protocol, Apr. 2010. RFC 5849."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1025746127771"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966970"},{"key":"e_1_3_2_1_15_1","volume-title":"5th International Workshop on Information Hiding","author":"Kedogan D.","year":"2002","unstructured":"D. Kedogan , D. Agrawal , and S. Penz . Limits of anonymity in open environments . In 5th International Workshop on Information Hiding , Oct. 2002 . D. Kedogan, D. Agrawal, and S. Penz. Limits of anonymity in open environments. In 5th International Workshop on Information Hiding, Oct. 2002."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.4304\/jait.2.2.109-121"},{"key":"e_1_3_2_1_17_1","volume-title":"ISC.","author":"Kontaxis G.","year":"2011","unstructured":"G. Kontaxis , M. Polychronakis , and E. P. Markatos . SudoWeb: Minimizing information disclosure to third parties in single sign-on platforms . In ISC. 2011 . G. Kontaxis, M. Polychronakis, and E. P. Markatos. SudoWeb: Minimizing information disclosure to third parties in single sign-on platforms. In ISC. 2011."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27800-9_28"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572577"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.387"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307664"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/1754868.1754924"},{"key":"e_1_3_2_1_23_1","volume-title":"IAB Workshop on Internet Privacy","author":"Narayanan A.","year":"2010","unstructured":"A. Narayanan . SocialKeys : Transparent cryptography via key distribution over social networks . In IAB Workshop on Internet Privacy , 2010 . A. Narayanan. SocialKeys: Transparent cryptography via key distribution over social networks. In IAB Workshop on Internet Privacy, 2010."},{"key":"e_1_3_2_1_24_1","unstructured":"OpenID. http:\/\/openid.net\/.  OpenID. http:\/\/openid.net\/."},{"key":"e_1_3_2_1_25_1","volume-title":"Design Issues in Anonymity and Unobservability","author":"Raymond J.-F.","year":"2000","unstructured":"J.-F. Raymond . Traffic Analysis : Protocols, Attacks, Design Issues, and Open Problems . In Design Issues in Anonymity and Unobservability , July 2000 . J.-F. Raymond. Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems. In Design Issues in Anonymity and Unobservability, July 2000."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/647097.717015"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_3_2_1_28_1","volume-title":"Advances in cryptology","author":"Shamir A.","year":"1985","unstructured":"A. Shamir . Identity-based cryptosystems and signature schemes . In Advances in cryptology , 1985 . A. Shamir. Identity-based cryptosystems and signature schemes. In Advances in cryptology, 1985."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2181176.2181189"},{"key":"e_1_3_2_1_30_1","volume-title":"CRYPTO","author":"Tanaka H.","year":"1987","unstructured":"H. Tanaka . A realization scheme for the identity-based cryptosystem . In CRYPTO , 1987 . H. Tanaka. A realization scheme for the identity-based cryptosystem. In CRYPTO, 1987."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.17709"},{"key":"e_1_3_2_1_32_1","volume-title":"World of Science","author":"Watanabe R.","year":"2011","unstructured":"R. Watanabe and Y. Miyake . Account management method with blind signature scheme. Engineering and Technology , World of Science , 2011 . R. Watanabe and Y. Miyake. Account management method with blind signature scheme. Engineering and Technology, World of Science, 2011."},{"key":"e_1_3_2_1_33_1","volume-title":"EuroSec","author":"Wolinsky D. I.","year":"2012","unstructured":"D. I. Wolinsky , H. Corrigan-Gibbs , B. Ford , and A. Johnson . Scalable anonymous group communication in the anytrust model . In EuroSec , Apr. 2012 . D. I. Wolinsky, H. Corrigan-Gibbs, B. Ford, and A. Johnson. Scalable anonymous group communication in the anytrust model. In EuroSec, Apr. 2012."},{"key":"e_1_3_2_1_34_1","volume-title":"10th OSDI","author":"Wolinsky D. I.","year":"2012","unstructured":"D. I. Wolinsky , H. Corrigan-Gibbs , A. Johnson , and B. Ford . Dissent in numbers: Making strong anonymity scale . In 10th OSDI , Oct. 2012 . D. I. Wolinsky, H. Corrigan-Gibbs, A. Johnson, and B. Ford. Dissent in numbers: Making strong anonymity scale. In 10th OSDI, Oct. 2012."}],"event":{"name":"HotNets-XII: Twelfth ACM Workshop on Hot Topics in Networks","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","CISCO"],"location":"College Park Maryland","acronym":"HotNets-XII"},"container-title":["Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2535771.2535798","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2535771.2535798","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:39:24Z","timestamp":1750235964000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2535771.2535798"}},"subtitle":["an architecture for privacy preserving online identities"],"short-title":[],"issued":{"date-parts":[[2013,11,21]]},"references-count":34,"alternative-id":["10.1145\/2535771.2535798","10.1145\/2535771"],"URL":"https:\/\/doi.org\/10.1145\/2535771.2535798","relation":{},"subject":[],"published":{"date-parts":[[2013,11,21]]},"assertion":[{"value":"2013-11-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}