{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:13:13Z","timestamp":1772039593179,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T00:00:00Z","timestamp":1572998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1617676"],"award-info":[{"award-number":["CNS-1617676"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,6]]},"DOI":"10.1145\/3319535.3363202","type":"proceedings-article","created":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T13:08:32Z","timestamp":1573132112000},"page":"1639-1656","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":32,"title":["SEEMless"],"prefix":"10.1145","author":[{"given":"Melissa","family":"Chase","sequence":"first","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]},{"given":"Apoorvaa","family":"Deshpande","sequence":"additional","affiliation":[{"name":"Brown University, Providence, RI, USA"}]},{"given":"Esha","family":"Ghosh","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]},{"given":"Harjasleen","family":"Malvai","sequence":"additional","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,11,6]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"2016 USENIX Annual Technical Conference (USENIX ATC 16)","author":"Ali Muneeb","unstructured":"Muneeb Ali , Jude Nelson , Ryan Shea , and Michael J. Freedman . 2016. Blockstack: A Global Naming and Storage System Secured by Blockchains . In 2016 USENIX Annual Technical Conference (USENIX ATC 16) . USENIX Association, Denver, CO, 181--194. https:\/\/www.usenix.org\/conference\/atc16\/technical-sessions\/presentation\/ali Muneeb Ali, Jude Nelson, Ryan Shea, and Michael J. Freedman. 2016. Blockstack: A Global Naming and Storage System Secured by Blockchains. In 2016 USENIX Annual Technical Conference (USENIX ATC 16). USENIX Association, Denver, CO, 181--194. https:\/\/www.usenix.org\/conference\/atc16\/technical-sessions\/presentation\/ali"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53357-4_7"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85886-7_32"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_25"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74143-5_17"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1921168.1921183"},{"key":"e_1_3_2_2_7_1","unstructured":"developer.twitter.com. 2010. Counting Characters. https:\/\/developer.twitter.com\/en\/docs\/basics\/counting-characters.html. (2010). Accessed: 2018--12--25.  developer.twitter.com. 2010. Counting Characters. https:\/\/developer.twitter.com\/en\/docs\/basics\/counting-characters.html. (2010). Accessed: 2018--12--25."},{"key":"e_1_3_2_2_8_1","volume-title":"Certificate Transparency with Privacy. arXiv preprint arXiv:1703.02209","author":"Eskandarian Saba","year":"2017","unstructured":"Saba Eskandarian , Eran Messeri , Joe Bonneau , and Dan Boneh . 2017. Certificate Transparency with Privacy. arXiv preprint arXiv:1703.02209 ( 2017 ). Saba Eskandarian, Eran Messeri, Joe Bonneau, and Dan Boneh. 2017. Certificate Transparency with Privacy. arXiv preprint arXiv:1703.02209 (2017)."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-2012-02606-8"},{"key":"e_1_3_2_2_11_1","volume-title":"How to hash into elliptic curves. Advances in Cryptology-CRYPTO","author":"Icart Thomas","year":"2009","unstructured":"Thomas Icart . 2009. How to hash into elliptic curves. Advances in Cryptology-CRYPTO 2009 . Springer , 303--316. Thomas Icart. 2009. How to hash into elliptic curves. Advances in Cryptology-CRYPTO 2009. Springer, 303--316."},{"key":"e_1_3_2_2_12_1","unstructured":"Keybase.io. 2014. Keybase is now writing to the Bitcoin blockchain. https:\/\/keybase.io\/docs\/server_security\/merkle_root_in_bitcoin_blockchain. (2014). Accessed: 2018--10-05.  Keybase.io. 2014. Keybase is now writing to the Bitcoin blockchain. https:\/\/keybase.io\/docs\/server_security\/merkle_root_in_bitcoin_blockchain. (2014). Accessed: 2018--10-05."},{"key":"e_1_3_2_2_13_1","unstructured":"Keybase.io. 2019 a. Keybase is not softer than TOFU. https:\/\/keybase.io\/blog\/chat-apps-softer-than-tofu. (2019). Accessed: 2019-05-05.  Keybase.io. 2019 a. Keybase is not softer than TOFU. https:\/\/keybase.io\/blog\/chat-apps-softer-than-tofu. (2019). Accessed: 2019-05-05."},{"key":"e_1_3_2_2_14_1","unstructured":"Keybase.io. 2019 b. Managing Teams and Keys with Keybase. https:\/\/keybase.io\/docs-assets\/blog\/NCC_Group_Keybase_KB2018_Public_Report_2019-02--27_v1.3.pdf. (2019). Accessed: 2019-05-05.  Keybase.io. 2019 b. Managing Teams and Keys with Keybase. https:\/\/keybase.io\/docs-assets\/blog\/NCC_Group_Keybase_KB2018_Public_Report_2019-02--27_v1.3.pdf. (2019). Accessed: 2019-05-05."},{"key":"e_1_3_2_2_15_1","unstructured":"Keybase.io. 2019 c. Protocol Security Review. https:\/\/rwc.iacr.org\/2019\/slides\/keybase-rwc2019.pdf. (2019). Accessed: 2019-05-05.  Keybase.io. 2019 c. Protocol Security Review. https:\/\/rwc.iacr.org\/2019\/slides\/keybase-rwc2019.pdf. (2019). Accessed: 2019-05-05."},{"key":"e_1_3_2_2_16_1","volume-title":"The art of computer programming: sorting and searching","author":"Knuth Donald Ervin","unstructured":"Donald Ervin Knuth . 1998. The art of computer programming: sorting and searching . Vol. 3 . Pearson Education . Donald Ervin Knuth. 1998. The art of computer programming: sorting and searching. Vol. 3. Pearson Education."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/11593447_10"},{"key":"e_1_3_2_2_19_1","volume-title":"CONIKS: Bringing Key Transparency to End Users. Usenix Security. 383--398.","author":"Melara Marcela S","year":"2015","unstructured":"Marcela S Melara , Aaron Blankstein , Joseph Bonneau , Edward W Felten , and Michael J Freedman . 2015 . CONIKS: Bringing Key Transparency to End Users. Usenix Security. 383--398. Marcela S Melara, Aaron Blankstein, Joseph Bonneau, Edward W Felten, and Michael J Freedman. 2015. CONIKS: Bringing Key Transparency to End Users. Usenix Security. 383--398."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2003.1238183"},{"key":"e_1_3_2_2_21_1","unstructured":"Namecoin. 2014. https:\/\/namecoin.org. (2014). Accessed: 2018--10-05.  Namecoin. 2014. https:\/\/namecoin.org. (2014). Accessed: 2018--10-05."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04444-1_9"},{"key":"e_1_3_2_2_23_1","unstructured":"LEAP Encryption Access Project. 2012. Nicknym. https:\/\/leap.se\/en\/docs\/design\/nicknym. (2012). Accessed: 2018--10-05.  LEAP Encryption Access Project. 2012. Nicknym. https:\/\/leap.se\/en\/docs\/design\/nicknym. (2012). Accessed: 2018--10-05."},{"key":"e_1_3_2_2_24_1","unstructured":"signal.org. 2016. Identity binding. https:\/\/www.signal.org\/docs\/specifications\/x3dh. (2016). Accessed: 2019-05-05.  signal.org. 2016. Identity binding. https:\/\/www.signal.org\/docs\/specifications\/x3dh. (2016). Accessed: 2019-05-05."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.19"},{"key":"e_1_3_2_2_26_1","volume-title":"Available at least as early as Jul","author":"Varda Kenton","year":"2008","unstructured":"Kenton Varda . 2008. Protocol buffers: Google's data interchange format. Google Open Source Blog , Available at least as early as Jul , Vol. 72 ( 2008 ). Kenton Varda. 2008. Protocol buffers: Google's data interchange format. Google Open Source Blog, Available at least as early as Jul, Vol. 72 (2008)."}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","location":"London United Kingdom","acronym":"CCS '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3363202","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3319535.3363202","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3319535.3363202","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:32Z","timestamp":1750203872000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3363202"}},"subtitle":["Secure End-to-End Encrypted Messaging with less&lt;\/&gt; Trust"],"short-title":[],"issued":{"date-parts":[[2019,11,6]]},"references-count":24,"alternative-id":["10.1145\/3319535.3363202","10.1145\/3319535"],"URL":"https:\/\/doi.org\/10.1145\/3319535.3363202","relation":{},"subject":[],"published":{"date-parts":[[2019,11,6]]},"assertion":[{"value":"2019-11-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}