{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T16:22:44Z","timestamp":1774023764513,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T00:00:00Z","timestamp":1572998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["DGE-1650441, CNS-1704296, CNS-1558500"],"award-info":[{"award-number":["DGE-1650441, CNS-1704296, CNS-1558500"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,6]]},"DOI":"10.1145\/3319535.3354243","type":"proceedings-article","created":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T13:08:32Z","timestamp":1573132112000},"page":"413-430","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["Traceback for End-to-End Encrypted Messaging"],"prefix":"10.1145","author":[{"given":"Nirvan","family":"Tyagi","sequence":"first","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}]},{"given":"Ian","family":"Miers","sequence":"additional","affiliation":[{"name":"Cornell Tech &amp; University of Maryland, New York City, NY, USA"}]},{"given":"Thomas","family":"Ristenpart","sequence":"additional","affiliation":[{"name":"Cornell Tech, New York City, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,11,6]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"crossref","unstructured":"Mihir Bellare and Phillip Rogaway. 2006. The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs. In EUROCRYPT.  Mihir Bellare and Phillip Rogaway. 2006. The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs. In EUROCRYPT.","DOI":"10.1007\/11761679_25"},{"key":"e_1_3_2_2_2_1","volume-title":"Franklin","author":"Boneh Dan","year":"1999"},{"key":"e_1_3_2_2_3_1","volume-title":"EUROCRYPT (Lecture Notes in Computer Science)","author":"Boneh Dan"},{"key":"e_1_3_2_2_4_1","volume-title":"Digital Payment Systems With Passive Anonymity-Revoking Trustees. Journal of Computer Security","author":"Camenisch Jan","year":"1997"},{"key":"e_1_3_2_2_5_1","volume-title":"CRYPTO (1) (Lecture Notes in Computer Science)","author":"Cash David"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.841169"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180417"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"crossref","unstructured":"Yevgeniy Dodis Paul Grubbs Thomas Ristenpart and Joanne Woodage. 2018. Fast Message Franking: From Invisible Salamanders to Encryptment. In CRYPTO.  Yevgeniy Dodis Paul Grubbs Thomas Ristenpart and Joanne Woodage. 2018. Fast Message Franking: From Invisible Salamanders to Encryptment. In CRYPTO.","DOI":"10.1007\/978-3-319-96884-1_6"},{"key":"e_1_3_2_2_9_1","unstructured":"Facebook. 2017. Messenger Secret Conversations technical whitepaper. https:\/\/fbnewsroomus.files.wordpress.com\/2016\/07\/messenger-secret-conversations-technical-whitepaper.pdf .  Facebook. 2017. Messenger Secret Conversations technical whitepaper. https:\/\/fbnewsroomus.files.wordpress.com\/2016\/07\/messenger-secret-conversations-technical-whitepaper.pdf ."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"crossref","unstructured":"Yair Frankel Yiannis Tsiounis and Moti Yung. 1996. \"Indirect Discourse Proof\": Achieving Efficient Fair Off-Line E-cash. In ASIACRYPT.  Yair Frankel Yiannis Tsiounis and Moti Yung. 1996. \"Indirect Discourse Proof\": Achieving Efficient Fair Off-Line E-cash. In ASIACRYPT.","DOI":"10.1007\/BFb0034855"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2016.1153700"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"crossref","unstructured":"Paul Grubbs Jiahui Lu and Thomas Ristenpart. 2017. Message Franking via Committing Authenticated Encryption. In CRYPTO.  Paul Grubbs Jiahui Lu and Thomas Ristenpart. 2017. Message Franking via Committing Authenticated Encryption. In CRYPTO.","DOI":"10.1007\/978-3-319-63697-9_3"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"crossref","unstructured":"Ryan Henry and Ian Goldberg. 2013. Thinking inside the BLAC box: smarter protocols for faster anonymous blacklisting. In WPES. ACM 71--82.  Ryan Henry and Ian Goldberg. 2013. Thinking inside the BLAC box: smarter protocols for faster anonymous blacklisting. In WPES. ACM 71--82.","DOI":"10.1145\/2517840.2517855"},{"key":"e_1_3_2_2_14_1","unstructured":"Mike Isaac and Kevin Roose. 2018. Disinformation Spreads on WhatsApp Ahead of Brazilian Election. https:\/\/www.nytimes.com\/2018\/10\/19\/technology\/whatsapp-brazil-presidential-election.html  Mike Isaac and Kevin Roose. 2018. Disinformation Spreads on WhatsApp Ahead of Brazilian Election. https:\/\/www.nytimes.com\/2018\/10\/19\/technology\/whatsapp-brazil-presidential-election.html"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"crossref","unstructured":"Dennis K\u00fcgler and Holger Vogt. 2002. Offline Payments with Auditable Tracing. In Financial Cryptography (FC) .  Dennis K\u00fcgler and Holger Vogt. 2002. Offline Payments with Auditable Tracing. In Financial Cryptography (FC) .","DOI":"10.1007\/3-540-36504-4_19"},{"key":"e_1_3_2_2_16_1","unstructured":"Joshua Lund. 2018. Technology preview: sealed sender for Signal. https:\/\/signal.org\/blog\/sealed-sender\/  Joshua Lund. 2018. Technology preview: sealed sender for Signal. https:\/\/signal.org\/blog\/sealed-sender\/"},{"key":"e_1_3_2_2_17_1","unstructured":"Alexis Madrigal. 2018. India's Lynching Epidemic and the Problem With Blaming Tech. https:\/\/www.theatlantic.com\/technology\/archive\/2018\/09\/whatsapp\/571276\/  Alexis Madrigal. 2018. India's Lynching Epidemic and the Problem With Blaming Tech. https:\/\/www.theatlantic.com\/technology\/archive\/2018\/09\/whatsapp\/571276\/"},{"key":"e_1_3_2_2_18_1","unstructured":"Farhad Manjoo. 2018. The Problem With Fixing WhatsApp? Human Nature Might Get in the Way. https:\/\/www.nytimes.com\/2018\/10\/24\/technology\/fixing-whatsapp-disinformation-human-nature.html  Farhad Manjoo. 2018. The Problem With Fixing WhatsApp? Human Nature Might Get in the Way. https:\/\/www.nytimes.com\/2018\/10\/24\/technology\/fixing-whatsapp-disinformation-human-nature.html"},{"key":"e_1_3_2_2_19_1","unstructured":"Benjamin Mullin. 2017. The New York Times is teaming up with Alphabet's Jigsaw to expand its comments. https:\/\/www.poynter.org\/news\/new-york-times-teaming-alphabets-jigsaw-expand-its-comments  Benjamin Mullin. 2017. The New York Times is teaming up with Alphabet's Jigsaw to expand its comments. https:\/\/www.poynter.org\/news\/new-york-times-teaming-alphabets-jigsaw-expand-its-comments"},{"key":"e_1_3_2_2_20_1","volume-title":"Anderson","author":"Savage Stefan","year":"2000"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/317087.317089"},{"key":"e_1_3_2_2_22_1","volume-title":"McCune","author":"Schwartz Edward J.","year":"2010"},{"key":"e_1_3_2_2_23_1","volume-title":"Deng","author":"Sengupta Binanda","year":"2019"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"crossref","unstructured":"Alex C. Snoeren. 2001. Hash-based IP traceback. In SIGCOMM.  Alex C. Snoeren. 2001. Hash-based IP traceback. In SIGCOMM.","DOI":"10.1145\/383059.383060"},{"key":"e_1_3_2_2_25_1","unstructured":"Dawn Xiaodong Song and Adrian Perrig. 2001. Advanced and Authenticated Marking Schemes for IP Traceback. In INFOCOM.  Dawn Xiaodong Song and Adrian Perrig. 2001. Advanced and Authenticated Marking Schemes for IP Traceback. In INFOCOM."},{"key":"e_1_3_2_2_26_1","volume-title":"Stadium: A Distributed Metadata-Private Messaging System. In SOSP. ACM, 423--440.","author":"Tyagi Nirvan","year":"2017"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"crossref","unstructured":"Jelle van den Hooff David Lazar Matei Zaharia and Nickolai Zeldovich. 2015. Vuvuzela: scalable private messaging resistant to traffic analysis. In SOSP. ACM 137--152.  Jelle van den Hooff David Lazar Matei Zaharia and Nickolai Zeldovich. 2015. Vuvuzela: scalable private messaging resistant to traffic analysis. In SOSP. ACM 137--152.","DOI":"10.1145\/2815400.2815417"},{"key":"e_1_3_2_2_28_1","unstructured":"WhatsApp. [n. d.]. https:\/\/faq.whatsapp.com\/en\/android\/26000165\/  WhatsApp. [n. d.]. https:\/\/faq.whatsapp.com\/en\/android\/26000165\/"},{"key":"e_1_3_2_2_29_1","volume-title":"Dissent in Numbers: Making Strong Anonymity Scale","author":"Wolinsky David Isaac"}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","location":"London United Kingdom","acronym":"CCS '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3354243","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3319535.3354243","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3319535.3354243","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:24:03Z","timestamp":1750202643000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3354243"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,6]]},"references-count":29,"alternative-id":["10.1145\/3319535.3354243","10.1145\/3319535"],"URL":"https:\/\/doi.org\/10.1145\/3319535.3354243","relation":{},"subject":[],"published":{"date-parts":[[2019,11,6]]},"assertion":[{"value":"2019-11-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}