{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T14:39:14Z","timestamp":1773931154168,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,14]],"date-time":"2017-10-14T00:00:00Z","timestamp":1507939200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1413920, CNS-1414119, GRFP-2016206490"],"award-info":[{"award-number":["CNS-1413920, CNS-1414119, GRFP-2016206490"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006785","name":"Google","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006785","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,14]]},"DOI":"10.1145\/3132747.3132783","type":"proceedings-article","created":{"date-parts":[[2017,10,12]],"date-time":"2017-10-12T12:51:09Z","timestamp":1507812669000},"page":"423-440","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":79,"title":["Stadium"],"prefix":"10.1145","author":[{"given":"Nirvan","family":"Tyagi","sequence":"first","affiliation":[{"name":"Cornell University"}]},{"given":"Yossi","family":"Gilad","sequence":"additional","affiliation":[{"name":"Boston University, MIT CSAIL"}]},{"given":"Derek","family":"Leung","sequence":"additional","affiliation":[{"name":"MIT CSAIL"}]},{"given":"Matei","family":"Zaharia","sequence":"additional","affiliation":[{"name":"Stanford University"}]},{"given":"Nickolai","family":"Zeldovich","sequence":"additional","affiliation":[{"name":"MIT CSAIL"}]}],"member":"320","published-online":{"date-parts":[[2017,10,14]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"12th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2016","author":"Angel Sebastian","year":"2016","unstructured":"Sebastian Angel and Srinath T. V. Setty . 2016. Unobservable Communication over Fully Untrusted Infrastructure . In 12th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2016 , Savannah, GA, USA , November 2-4, 2016 . 551--569. https:\/\/www.usenix.org\/conference\/osdi16\/technical-sessions\/presentation\/angel Sebastian Angel and Srinath T. V. Setty. 2016. Unobservable Communication over Fully Untrusted Infrastructure. In 12th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2016, Savannah, GA, USA, November 2-4, 2016. 551--569. https:\/\/www.usenix.org\/conference\/osdi16\/technical-sessions\/presentation\/angel"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314333.1314336"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_17"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168596"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/11745853_14"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/11767831_2"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382260"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00206326"},{"key":"e_1_3_2_2_10_1","first-page":"8","article-title":"cMix: Anonymization by High-Performance Scalable Mixing","volume":"2016","author":"Chaum David","year":"2016","unstructured":"David Chaum , Farid Javani , Aniket Kate , Anna Krasnova , Joeri de Ruiter , and Alan T. Sherman . 2016 . cMix: Anonymization by High-Performance Scalable Mixing . IACR Cryptology ePrint Archive 2016 (2016), 8 . http:\/\/eprint.iacr.org\/2016\/008 David Chaum, Farid Javani, Aniket Kate, Anna Krasnova, Joeri de Ruiter, and Alan T. Sherman. 2016. cMix: Anonymization by High-Performance Scalable Mixing. IACR Cryptology ePrint Archive 2016 (2016), 8. http:\/\/eprint.iacr.org\/2016\/008","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_2_11_1","volume-title":"Advances in Cryptology---CRYPTO '92 (Lecture Notes in Computer Science), Ernest F","author":"Chaum David","year":"1993","unstructured":"David Chaum and Torben Pryds Pedersen . 1992. Wallet Databases with Observers (Extended Abstract) . In Advances in Cryptology---CRYPTO '92 (Lecture Notes in Computer Science), Ernest F . Brickell (Ed.), Vol. 740 . Springer-Verlag , 1993 , 89--105. David Chaum and Torben Pryds Pedersen. 1992. Wallet Databases with Observers (Extended Abstract). In Advances in Cryptology---CRYPTO '92 (Lecture Notes in Computer Science), Ernest F. Brickell (Ed.), Vol. 740. Springer-Verlag, 1993, 89--105."},{"key":"e_1_3_2_2_13_1","first-page":"07","article-title":"Civitas: A Secure Remote Voting System","volume":"29","author":"Clarkson Michael E.","year":"2007","unstructured":"Michael E. Clarkson , Stephen Chong , and Andrew C. Myers . 2007 . Civitas: A Secure Remote Voting System . In Frontiers of Electronic Voting , 29 . 07 .-03.08.2007. http:\/\/drops.dagstuhl.de\/opus\/volltexte\/2008\/1296 Michael E. Clarkson, Stephen Chong, and Andrew C. Myers. 2007. Civitas: A Secure Remote Voting System. In Frontiers of Electronic Voting, 29.07.-03.08.2007. http:\/\/drops.dagstuhl.de\/opus\/volltexte\/2008\/1296","journal-title":"Frontiers of Electronic Voting"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.27"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866346"},{"key":"e_1_3_2_2_16_1","volume-title":"41st International Colloquium, ICALP 2014, Copenhagen, Denmark, July 8-11, 2014, Proceedings, Part I. 344--355","author":"Czumaj Artur","year":"2014","unstructured":"Artur Czumaj and Berthold V\u00f6cking . 2014 . Thorp Shuffling, Butterflies, and Non-Markovian Couplings. In Automata, Languages, and Programming - 41st International Colloquium, ICALP 2014, Copenhagen, Denmark, July 8-11, 2014, Proceedings, Part I. 344--355 . Artur Czumaj and Berthold V\u00f6cking. 2014. Thorp Shuffling, Butterflies, and Non-Markovian Couplings. In Automata, Languages, and Programming - 41st International Colloquium, ICALP 2014, Copenhagen, Denmark, July 8-11, 2014, Proceedings, Part I. 344--355."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/829515.830555"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251396"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/11423409_12"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.28"},{"key":"e_1_3_2_2_22_1","volume-title":"CRYPTO (Lecture Notes in Computer Science), Andrew M","author":"Fiat Amos","unstructured":"Amos Fiat and Adi Shamir . 1986. How to Prove Yourself: Practical Solutions to Identification and Signature Problems . In CRYPTO (Lecture Notes in Computer Science), Andrew M . Odlyzko (Ed.), Vol. 263 . Springer , 186--194. Amos Fiat and Adi Shamir. 1986. How to Prove Yourself: Practical Solutions to Identification and Signature Problems. In CRYPTO (Lecture Notes in Computer Science), Andrew M. Odlyzko (Ed.), Vol. 263. Springer, 186--194."},{"key":"e_1_3_2_2_23_1","volume-title":"21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings. 368--387","author":"Furukawa Jun","year":"2001","unstructured":"Jun Furukawa and Kazue Sako . 2001 . An Efficient Scheme for Proving a Shuffle. In Advances in Cryptology - CRYPTO 2001 , 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings. 368--387 . Jun Furukawa and Kazue Sako. 2001. An Efficient Scheme for Proving a Shuffle. In Advances in Cryptology - CRYPTO 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings. 368--387."},{"key":"e_1_3_2_2_24_1","first-page":"489","article-title":"Two Cents for Strong Anonymity: The Anonymous Post-office Protocol","volume":"2016","author":"Gelernter Nethanel","year":"2016","unstructured":"Nethanel Gelernter , Amir Herzberg , and Hemi Leibowitz . 2016 . Two Cents for Strong Anonymity: The Anonymous Post-office Protocol . IACR Cryptology ePrint Archive 2016 (2016), 489 . http:\/\/eprint.iacr.org\/2016\/489 Nethanel Gelernter, Amir Herzberg, and Hemi Leibowitz. 2016. Two Cents for Strong Anonymity: The Anonymous Post-office Protocol. IACR Cryptology ePrint Archive 2016 (2016), 489. http:\/\/eprint.iacr.org\/2016\/489","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_2_25_1","volume-title":"Herbivore: A Scalable and Efficient Protocol for Anonymous Communication. Technical Report","author":"Goel Sharad","year":"2003","unstructured":"Sharad Goel , Mark Robson , Milo Polte , and Emin Sirer . 2003 . Herbivore: A Scalable and Efficient Protocol for Anonymous Communication. Technical Report . Cornell University . Sharad Goel, Mark Robson, Milo Polte, and Emin Sirer. 2003. Herbivore: A Scalable and Efficient Protocol for Anonymous Communication. Technical Report. Cornell University."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030113"},{"key":"e_1_3_2_2_27_1","volume-title":"Mixing Email with Babel. In 1996 Symposium on Network and Distributed System Security, (S)NDSS '96","author":"G\u00fclc\u00fc Ceki","year":"1996","unstructured":"Ceki G\u00fclc\u00fc and Gene Tsudik . 1996 . Mixing Email with Babel. In 1996 Symposium on Network and Distributed System Security, (S)NDSS '96 , San Diego, CA , February 22-23, 1996. 2--16. Ceki G\u00fclc\u00fc and Gene Tsudik. 1996. Mixing Email with Babel. In 1996 Symposium on Network and Distributed System Security, (S)NDSS '96, San Diego, CA, February 22-23, 1996. 2--16."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1002\/rsa.v29:4"},{"key":"e_1_3_2_2_29_1","volume-title":"Proceedings of the 11th USENIX Security Symposium","author":"Jakobsson Markus","year":"2002","unstructured":"Markus Jakobsson , Ari Juels , and Ronald L. Rivest . 2002. Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking . In Proceedings of the 11th USENIX Security Symposium , San Francisco, CA, USA , August 5-9, 2002 . 339--353. http\/\/:www.usenix.org\/publications\/library\/proceedings\/sec02\/jakobsson.html Markus Jakobsson, Ari Juels, and Ronald L. Rivest. 2002. Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking. In Proceedings of the 11th USENIX Security Symposium, San Francisco, CA, USA, August 5-9, 2002. 339--353. http\/\/:www.usenix.org\/publications\/library\/proceedings\/sec02\/jakobsson.html"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516651"},{"key":"e_1_3_2_2_31_1","volume-title":"Second International Workshop","author":"Kesdogan Dogan","year":"1998","unstructured":"Dogan Kesdogan , Jan Egner , and Roland B\u00fcschkes . 1998 . Stop-and-Go-MIXes Providing Probabilistic Anonymity in an Open System. In Information Hiding , Second International Workshop , Portland, Oregon, USA , April 14-17, 1998, Proceedings. 83--98. Dogan Kesdogan, Jan Egner, and Roland B\u00fcschkes. 1998. Stop-and-Go-MIXes Providing Probabilistic Anonymity in an Open System. In Information Hiding, Second International Workshop, Portland, Oregon, USA, April 14-17, 1998, Proceedings. 83--98."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132755"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1515\/popets-2016-0008","article-title":"Riffle: An Efficient Communication System With Strong Anonymity","volume":"2016","author":"Kwon Albert","year":"2016","unstructured":"Albert Kwon , David Lazar , Srinivas Devadas , and Bryan Ford . 2016 . Riffle: An Efficient Communication System With Strong Anonymity . PoPETs 2016 , 2 (2016), 115 -- 134 . http\/\/:www.degruyter.com\/view\/j\/popets.2015.2016.issue-2\/popets-2016-0008\/popets-2016-0008.xml Albert Kwon, David Lazar, Srinivas Devadas, and Bryan Ford. 2016. Riffle: An Efficient Communication System With Strong Anonymity. PoPETs 2016, 2 (2016), 115--134. http\/\/:www.degruyter.com\/view\/j\/popets.2015.2016.issue-2\/popets-2016-0008\/popets-2016-0008.xml","journal-title":"PoPETs"},{"key":"e_1_3_2_2_34_1","volume-title":"12th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2016","author":"Lazar David","year":"2016","unstructured":"David Lazar and Nickolai Zeldovich . 2016 . Alpenhorn: Bootstrapping Secure Communication without Leaking Metadata . In 12th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2016 , Savannah, GA, USA , November 2-4, 2016. 571--586. https:\/\/www.usenix.org\/conference\/osdi16\/technical-sessions\/presentation\/lazar David Lazar and Nickolai Zeldovich. 2016. Alpenhorn: Bootstrapping Secure Communication without Leaking Metadata. In 12th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2016, Savannah, GA, USA, November 2-4, 2016. 571--586. https:\/\/www.usenix.org\/conference\/osdi16\/technical-sessions\/presentation\/lazar"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/501983.502000"},{"key":"e_1_3_2_2_37_1","volume-title":"The Loopix Anonymity System. In 26th USENIX Security Symposium, USENIX Security 2017","author":"Piotrowska Ania M.","year":"2017","unstructured":"Ania M. Piotrowska , Jamie Hayes , Tariq Elahi , Sebastian Meiser , and George Danezis . 2017 . The Loopix Anonymity System. In 26th USENIX Security Symposium, USENIX Security 2017 , Vancouver, BC, Canada , August 16-18, 2017. 1199--1216. https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/piotrowska Ania M. Piotrowska, Jamie Hayes, Tariq Elahi, Sebastian Meiser, and George Danezis. 2017. The Loopix Anonymity System. In 26th USENIX Security Symposium, USENIX Security 2017, Vancouver, BC, Canada, August 16-18, 2017. 1199--1216. https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/piotrowska"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/167088.167260"},{"key":"e_1_3_2_2_39_1","volume-title":"The Snowden Leaks and the Public. The New-York Review of Book. (Nov","author":"Rusbridger Alan","year":"2013","unstructured":"Alan Rusbridger . 2013. The Snowden Leaks and the Public. The New-York Review of Book. (Nov . 2013 ). Alan Rusbridger. 2013. The Snowden Leaks and the Public. The New-York Review of Book. (Nov. 2013)."},{"key":"e_1_3_2_2_40_1","volume-title":"Advances in Cryptology - CRYPTO '89, 9th Annual International Cryptology Conference","author":"Schnorr Claus-Peter","year":"1989","unstructured":"Claus-Peter Schnorr . 1989. Efficient Identification and Signatures for Smart Cards . In Advances in Cryptology - CRYPTO '89, 9th Annual International Cryptology Conference , Santa Barbara, California, USA , August 20-24, 1989 , Proceedings . 239--252. Claus-Peter Schnorr. 1989. Efficient Identification and Signatures for Smart Cards. In Advances in Cryptology - CRYPTO '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings. 239--252."},{"key":"e_1_3_2_2_41_1","volume-title":"NTL: A Library for doing Number Theory. http\/\/:www.shoup.net\/ntl\/.","author":"Shoup Victor","year":"2016","unstructured":"Victor Shoup . 2016 . NTL: A Library for doing Number Theory. http\/\/:www.shoup.net\/ntl\/. (2016). Victor Shoup. 2016. NTL: A Library for doing Number Theory. http\/\/:www.shoup.net\/ntl\/. (2016)."},{"key":"e_1_3_2_2_42_1","volume-title":"Anonymous Connections and Onion Routing. In 1997 IEEE Symposium on Security and Privacy","author":"Syverson Paul F.","year":"1997","unstructured":"Paul F. Syverson , David M. Goldschlag , and Michael G. Reed . 1997 . Anonymous Connections and Onion Routing. In 1997 IEEE Symposium on Security and Privacy , May 4-7, 1997 , Oakland, CA, USA. 44--54. Paul F. Syverson, David M. Goldschlag, and Michael G. Reed. 1997. Anonymous Connections and Onion Routing. In 1997 IEEE Symposium on Security and Privacy, May 4-7, 1997, Oakland, CA, USA. 44--54."},{"key":"e_1_3_2_2_43_1","volume-title":"Tor Metrics: Advertised Relay Bandwidth. https:\/\/metrics.torproject.org\/advbwdist-perc.html?start=2016-03-15&end=2016-09-15&p=97. (May","author":"Project The Tor","year":"2016","unstructured":"The Tor Project . 2016 . Tor Metrics: Advertised Relay Bandwidth. https:\/\/metrics.torproject.org\/advbwdist-perc.html?start=2016-03-15&end=2016-09-15&p=97. (May 2016). The Tor Project. 2016. Tor Metrics: Advertised Relay Bandwidth. https:\/\/metrics.torproject.org\/advbwdist-perc.html?start=2016-03-15&end=2016-09-15&p=97. (May 2016)."},{"key":"e_1_3_2_2_44_1","first-page":"943","article-title":"Stadium: A Distributed Metadata-Private Messaging System","volume":"2016","author":"Tyagi Nirvan","year":"2016","unstructured":"Nirvan Tyagi , Yossi Gilad , Matei Zaharia , and Nickolai Zeldovich . 2016 . Stadium: A Distributed Metadata-Private Messaging System . IACR Cryptology ePrint Archive 2016 (2016), 943 . http:\/\/eprint.iacr.org\/2016\/943 Nirvan Tyagi, Yossi Gilad, Matei Zaharia, and Nickolai Zeldovich. 2016. Stadium: A Distributed Metadata-Private Messaging System. IACR Cryptology ePrint Archive 2016 (2016), 943. http:\/\/eprint.iacr.org\/2016\/943","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815417"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517851"},{"key":"e_1_3_2_2_47_1","volume-title":"Dissent in Numbers: Making Strong Anonymity Scale. In 10th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2012","author":"Wolinsky David Isaac","year":"2012","unstructured":"David Isaac Wolinsky , Henry Corrigan-Gibbs , Bryan Ford , and Aaron Johnson . 2012 . Dissent in Numbers: Making Strong Anonymity Scale. In 10th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2012 , Hollywood, CA, USA , October 8-10, 2012. 179--182. https:\/\/www.usenix.org\/conference\/osdi12\/technical-sessions\/presentation\/wolinsky David Isaac Wolinsky, Henry Corrigan-Gibbs, Bryan Ford, and Aaron Johnson. 2012. Dissent in Numbers: Making Strong Anonymity Scale. In 10th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2012, Hollywood, CA, USA, October 8-10, 2012. 179--182. https:\/\/www.usenix.org\/conference\/osdi12\/technical-sessions\/presentation\/wolinsky"}],"event":{"name":"SOSP '17: ACM SIGOPS 26th Symposium on Operating Systems Principles","location":"Shanghai China","acronym":"SOSP '17","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems","USENIX Assoc USENIX Assoc"]},"container-title":["Proceedings of the 26th Symposium on Operating Systems Principles"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3132747.3132783","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3132747.3132783","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:10:57Z","timestamp":1750212657000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3132747.3132783"}},"subtitle":["A Distributed Metadata-Private Messaging System"],"short-title":[],"issued":{"date-parts":[[2017,10,14]]},"references-count":45,"alternative-id":["10.1145\/3132747.3132783","10.1145\/3132747"],"URL":"https:\/\/doi.org\/10.1145\/3132747.3132783","relation":{},"subject":[],"published":{"date-parts":[[2017,10,14]]},"assertion":[{"value":"2017-10-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}