{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:11:52Z","timestamp":1772039512510,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,11]],"date-time":"2019-11-11T00:00:00Z","timestamp":1573430400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1814753"],"award-info":[{"award-number":["1814753"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,11]]},"DOI":"10.1145\/3338498.3358644","type":"proceedings-article","created":{"date-parts":[[2019,11,11]],"date-time":"2019-11-11T18:15:00Z","timestamp":1573496100000},"page":"55-73","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["End-to-End Secure Mobile Group Messaging with Conversation Integrity and Deniability"],"prefix":"10.1145","author":[{"given":"Michael","family":"Schliep","sequence":"first","affiliation":[{"name":"University of Minnesota, Minneapolis, MN, USA"}]},{"given":"Nicholas","family":"Hopper","sequence":"additional","affiliation":[{"name":"University of Minnesota, Minneapolis, MN, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,11,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314333.1314340"},{"key":"e_1_3_2_1_2_1","volume-title":"Amazon Web Services","author":"Inc.","year":"2019","unstructured":"Inc. Amazon Web Services . 2019 . Amazon Web Service (AWS) - Cloud Compute Services . https:\/\/aws.amazon.com\/ Inc. Amazon Web Services. 2019. Amazon Web Service (AWS) - Cloud Compute Services. https:\/\/aws.amazon.com\/"},{"key":"e_1_3_2_1_3_1","unstructured":"Richard Barnes Jon Millican Emad Omara Katriel Cohn-Gordon and Raphael Robert. 2019. The Messaging Layer Security (MLS) Protocol. Internet-Draft draft-ietf-mls-protocol-06. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-mls-protocol-06 Work in Progress.  Richard Barnes Jon Millican Emad Omara Katriel Cohn-Gordon and Raphael Robert. 2019. The Messaging Layer Security (MLS) Protocol. Internet-Draft draft-ietf-mls-protocol-06. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-mls-protocol-06 Work in Progress."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-008-9026-x"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029179.1029200"},{"key":"e_1_3_2_1_6_1","volume-title":"2017 IEEE European Symposium on. IEEE, 451--466","author":"Cohn-Gordon Katriel","year":"2017","unstructured":"Katriel Cohn-Gordon , Cas Cremers , Benjamin Dowling , Luke Garratt , and Douglas Stebila . 2017 . A formal security analysis of the signal messaging protocol. In Security and Privacy (EuroS&P) , 2017 IEEE European Symposium on. IEEE, 451--466 . Katriel Cohn-Gordon, Cas Cremers, Benjamin Dowling, Luke Garratt, and Douglas Stebila. 2017. A formal security analysis of the signal messaging protocol. In Security and Privacy (EuroS&P), 2017 IEEE European Symposium on. IEEE, 451--466."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243747"},{"key":"e_1_3_2_1_8_1","volume-title":"2016 IEEE European Symposium on. IEEE, 457--472","author":"Frosch Tilman","year":"2016","unstructured":"Tilman Frosch , Christian Mainka , Christoph Bader , Florian Bergsma , J\u00f6rg Schwenk , and Thorsten Holz . 2016 . How Secure is TextSecure?. In Security and Privacy (EuroS&P) , 2016 IEEE European Symposium on. IEEE, 457--472 . Tilman Frosch, Christian Mainka, Christoph Bader, Florian Bergsma, J\u00f6rg Schwenk, and Thorsten Holz. 2016. How Secure is TextSecure?. In Security and Privacy (EuroS&P), 2016 IEEE European Symposium on. IEEE, 457--472."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653705"},{"key":"e_1_3_2_1_10_1","unstructured":"The PostgreSQL Global Development Group. 2019. PostgreSQL: The world's most advanced open source database. https:\/\/www.postgresql.org\/  The PostgreSQL Global Development Group. 2019. PostgreSQL: The world's most advanced open source database. https:\/\/www.postgresql.org\/"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.38"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30191-2_38"},{"key":"e_1_3_2_1_13_1","volume-title":"Provable Security","author":"LaMacchia Brian","unstructured":"Brian LaMacchia , Kristin Lauter , and Anton Mityagin . 2007. Stronger security of authenticated key exchange . In Provable Security . Springer , 1--16. Brian LaMacchia, Kristin Lauter, and Anton Mityagin. 2007. Stronger security of authenticated key exchange. In Provable Security . Springer, 1--16."},{"key":"e_1_3_2_1_14_1","unstructured":"linode. [n.d.]. linode . https:\/\/linode.com\/.  linode. [n.d.]. linode . https:\/\/linode.com\/."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517867"},{"key":"e_1_3_2_1_16_1","unstructured":"Motorola Mobility LLC. 2019. Moto G3 - Motorola. https:\/\/www.motorola.com\/us\/products\/moto-g-gen-3  Motorola Mobility LLC. 2019. Moto G3 - Motorola. https:\/\/www.motorola.com\/us\/products\/moto-g-gen-3"},{"key":"e_1_3_2_1_17_1","unstructured":"Moxie Marlinspike. 2016a. Facebook Messenger deploys Signal Protocol for end to end encryption. https:\/\/whispersystems.org\/blog\/facebook-messenger\/  Moxie Marlinspike. 2016a. Facebook Messenger deploys Signal Protocol for end to end encryption. https:\/\/whispersystems.org\/blog\/facebook-messenger\/"},{"key":"e_1_3_2_1_18_1","unstructured":"Moxie Marlinspike. 2016b. Open Whisper Systems partners with Google on end-to-end encryption for Allo. https:\/\/whispersystems.org\/blog\/allo\/  Moxie Marlinspike. 2016b. Open Whisper Systems partners with Google on end-to-end encryption for Allo. https:\/\/whispersystems.org\/blog\/allo\/"},{"key":"e_1_3_2_1_19_1","unstructured":"Moxie Marlinspike and Trevor Perrin. 2016. The X3DH Key Agreement Protocol. https:\/\/whispersystems.org\/docs\/specifications\/x3dh\/  Moxie Marlinspike and Trevor Perrin. 2016. The X3DH Key Agreement Protocol. https:\/\/whispersystems.org\/docs\/specifications\/x3dh\/"},{"key":"e_1_3_2_1_20_1","unstructured":"Emad Omara Benjamin Beurdouche Eric Rescorla Srinivas Inguva Albert Kwon and Alan Duric. 2019. The Messaging Layer Security (MLS) Architecture. Internet-Draft draft-ietf-mls-architecture-02. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-mls-architecture-02 Work in Progress.  Emad Omara Benjamin Beurdouche Eric Rescorla Srinivas Inguva Albert Kwon and Alan Duric. 2019. The Messaging Layer Security (MLS) Architecture. Internet-Draft draft-ietf-mls-architecture-02. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-mls-architecture-02 Work in Progress."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25937-4_22"},{"key":"e_1_3_2_1_22_1","volume-title":"WhatsApp, and Threema.","author":"R\u00f6sler Paul","year":"2018","unstructured":"Paul R\u00f6sler , Christian Mainka , and J\u00f6rg Schwenk . 2018. More is Less: On the End-to-End Security of Group Chats in Signal , WhatsApp, and Threema. ( 2018 ). Paul R\u00f6sler, Christian Mainka, and J\u00f6rg Schwenk. 2018. More is Less: On the End-to-End Security of Group Chats in Signal, WhatsApp, and Threema. (2018)."},{"key":"e_1_3_2_1_23_1","volume-title":"Real World Crypto Symposium. IACR.","author":"Sankuratripati Subhash","year":"2019","unstructured":"Subhash Sankuratripati , Moti Yung , Anirudh Grag , and Wentao Huang . 2019 . Catch Me if You Can: An Account Based End-to-end Encryption for 1\/1 Snaps . In Real World Crypto Symposium. IACR. Subhash Sankuratripati, Moti Yung, Anirudh Grag, and Wentao Huang. 2019. Catch Me if You Can: An Account Based End-to-end Encryption for 1\/1 Snaps. In Real World Crypto Symposium. IACR."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3139550.3139568"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0027"},{"key":"e_1_3_2_1_26_1","unstructured":"Open Whisper Systems. [n.d.]. Open Whisper Systems . https:\/\/whispersystems.org\/.  Open Whisper Systems. [n.d.]. Open Whisper Systems . https:\/\/whispersystems.org\/."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.22"},{"key":"e_1_3_2_1_28_1","unstructured":"WhatsApp. 2017. https:\/\/www.whatsapp.com\/security  WhatsApp. 2017. https:\/\/www.whatsapp.com\/security"}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","location":"London United Kingdom","acronym":"CCS '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338498.3358644","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3338498.3358644","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3338498.3358644","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:12:48Z","timestamp":1750201968000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338498.3358644"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,11]]},"references-count":28,"alternative-id":["10.1145\/3338498.3358644","10.1145\/3338498"],"URL":"https:\/\/doi.org\/10.1145\/3338498.3358644","relation":{},"subject":[],"published":{"date-parts":[[2019,11,11]]},"assertion":[{"value":"2019-11-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}