{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T10:16:59Z","timestamp":1769854619224,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,30]],"date-time":"2020-10-30T00:00:00Z","timestamp":1604016000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,30]]},"DOI":"10.1145\/3372297.3417887","type":"proceedings-article","created":{"date-parts":[[2021,3,4]],"date-time":"2021-03-04T16:21:21Z","timestamp":1614874881000},"page":"1445-1459","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":37,"title":["The Signal Private Group System and Anonymous Credentials Supporting Efficient Verifiable Encryption"],"prefix":"10.1145","author":[{"given":"Melissa","family":"Chase","sequence":"first","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]},{"given":"Trevor","family":"Perrin","sequence":"additional","affiliation":[{"name":"Signal Technology Foundation, Oakland, CA, USA"}]},{"given":"Greg","family":"Zaverucha","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,11,2]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49896-5_29"},{"key":"e_1_3_2_2_2_1","first-page":"1087","volume-title":"ACM CCS 2013","author":"Baldimtsi Foteini","year":"2013","unstructured":"Foteini Baldimtsi and Anna Lysyanskaya . Anonymous credentials light. In Ahmad-Reza Sadeghi, Virgil D. Gligor, and Moti Yung, editors , ACM CCS 2013 , pages 1087 -- 1098 . ACM Press , November 2013 . Foteini Baldimtsi and Anna Lysyanskaya. Anonymous credentials light. In Ahmad-Reza Sadeghi, Virgil D. Gligor, and Moti Yung, editors, ACM CCS 2013, pages 1087--1098. ACM Press, November 2013."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/795663.796360"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"crossref","unstructured":"Daniel J. Bernstein . The poly1305-AES message-authentication code . In Henri Gilbert and Helena Handschuh editors FSE 2005 volume 3557 of LNCS pages 32 -- 49 . Springer Heidelberg February 2005. Daniel J. Bernstein. The poly1305-AES message-authentication code. In Henri Gilbert and Helena Handschuh editors FSE 2005 volume 3557 of LNCS pages 32--49. Springer Heidelberg February 2005.","DOI":"10.1007\/11502760_3"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"crossref","unstructured":"Daniel J. Bernstein . Curve25519: New Diffie-Hellman speed records . In Moti Yung Yevgeniy Dodis Aggelos Kiayias and Tal Malkin editors PKC 2006 volume 3958 of LNCS pages 207 -- 228 . Springer Heidelberg April 2006. Daniel J. Bernstein. Curve25519: New Diffie-Hellman speed records. In Moti Yung Yevgeniy Dodis Aggelos Kiayias and Tal Malkin editors PKC 2006 volume 3958 of LNCS pages 207--228. Springer Heidelberg April 2006.","DOI":"10.1007\/11745853_14"},{"key":"e_1_3_2_2_6_1","volume-title":"A graduate course in applied cryptography","author":"Boneh Dan","year":"2020","unstructured":"Dan Boneh and Victor Shoup . A graduate course in applied cryptography , 2020 . Available online https:\/\/crypto.stanford.edu\/ dabo\/cryptobook\/. Dan Boneh and Victor Shoup. A graduate course in applied cryptography, 2020. Available online https:\/\/crypto.stanford.edu\/ dabo\/cryptobook\/."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"crossref","unstructured":"Jan Camenisch and Ivan Damg\u00e5rd . Verifiable encryption group encryption and their applications to separable group signatures and signature sharing schemes . In Tatsuaki Okamoto editor ASIACRYPT 2000 volume 1976 of LNCS pages 331 -- 345 . Springer Heidelberg December 2000. Jan Camenisch and Ivan Damg\u00e5rd. Verifiable encryption group encryption and their applications to separable group signatures and signature sharing schemes. In Tatsuaki Okamoto editor ASIACRYPT 2000 volume 1976 of LNCS pages 331--345. Springer Heidelberg December 2000.","DOI":"10.1007\/3-540-44448-3_25"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"crossref","unstructured":"Jan Camenisch Kristiyan Haralambiev Markulf Kohlweiss Jorn Lapon and Vincent Naessens . Structure preserving CCA secure encryption and applications . In Dong Hoon Lee and Xiaoyun Wang editors ASIACRYPT 2011 volume 7073 of LNCS pages 89 -- 106 . Springer Heidelberg December 2011. Jan Camenisch Kristiyan Haralambiev Markulf Kohlweiss Jorn Lapon and Vincent Naessens. Structure preserving CCA secure encryption and applications. In Dong Hoon Lee and Xiaoyun Wang editors ASIACRYPT 2011 volume 7073 of LNCS pages 89--106. Springer Heidelberg December 2011.","DOI":"10.1007\/978-3-642-25385-0_5"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"crossref","unstructured":"Jan Camenisch and Anna Lysyanskaya . A signature scheme with efficient protocols . In Stelvio Cimato Clemente Galdi and Giuseppe Persiano editors SCN 02 volume 2576 of LNCS pages 268 -- 289 . Springer Heidelberg September 2003 . Jan Camenisch and Anna Lysyanskaya. A signature scheme with efficient protocols. In Stelvio Cimato Clemente Galdi and Giuseppe Persiano editors SCN 02 volume 2576 of LNCS pages 268--289. Springer Heidelberg September 2003.","DOI":"10.1007\/3-540-36413-7_20"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"crossref","unstructured":"Jan Camenisch and Anna Lysyanskaya . Signature schemes and anonymous credentials from bilinear maps . In Matthew Franklin editor CRYPTO 2004 volume 3152 of LNCS pages 56 -- 72 . Springer Heidelberg August 2004. Jan Camenisch and Anna Lysyanskaya. Signature schemes and anonymous credentials from bilinear maps. In Matthew Franklin editor CRYPTO 2004 volume 3152 of LNCS pages 56--72. Springer Heidelberg August 2004.","DOI":"10.1007\/978-3-540-28628-8_4"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"crossref","unstructured":"Jan Camenisch and Victor Shoup . Practical verifiable encryption and decryption of discrete logarithms . In Dan Boneh editor CRYPTO 2003 volume 2729 of LNCS pages 126 -- 144 . Springer Heidelberg August 2003. Jan Camenisch and Victor Shoup. Practical verifiable encryption and decryption of discrete logarithms. In Dan Boneh editor CRYPTO 2003 volume 2729 of LNCS pages 126--144. Springer Heidelberg August 2003.","DOI":"10.1007\/978-3-540-45146-4_8"},{"key":"e_1_3_2_2_13_1","first-page":"21","volume-title":"ACM CCS 2002","author":"Camenisch Jan","year":"2002","unstructured":"Jan Camenisch and Els Van Herreweghen . Design and implementation of the idemix anonymous credential system. In Vijayalakshmi Atluri, editor , ACM CCS 2002 , pages 21 -- 30 . ACM Press , November 2002 . Jan Camenisch and Els Van Herreweghen. Design and implementation of the idemix anonymous credential system. In Vijayalakshmi Atluri, editor, ACM CCS 2002, pages 21--30. ACM Press, November 2002."},{"key":"e_1_3_2_2_14_1","first-page":"1205","volume-title":"ACM CCS 2014","author":"Chase Melissa","year":"2014","unstructured":"Melissa Chase , Sarah Meiklejohn , and Greg Zaverucha . Algebraic MACs and keyed-verification anonymous credentials. In Gail-Joon Ahn, Moti Yung, and Ninghui Li, editors , ACM CCS 2014 , pages 1205 -- 1216 . ACM Press , November 2014 . Melissa Chase, Sarah Meiklejohn, and Greg Zaverucha. Algebraic MACs and keyed-verification anonymous credentials. In Gail-Joon Ahn, Moti Yung, and Ninghui Li, editors, ACM CCS 2014, pages 1205--1216. ACM Press, November 2014."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/4372.4373"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"crossref","unstructured":"Yevgeniy Dodis Eike Kiltz Krzysztof Pietrzak and Daniel Wichs . Message authentication revisited . In David Pointcheval and Thomas Johansson editors EUROCRYPT 2012 volume 7237 of LNCS pages 355 -- 374 . Springer Heidelberg April 2012. Yevgeniy Dodis Eike Kiltz Krzysztof Pietrzak and Daniel Wichs. Message authentication revisited. In David Pointcheval and Thomas Johansson editors EUROCRYPT 2012 volume 7237 of LNCS pages 355--374. Springer Heidelberg April 2012.","DOI":"10.1007\/978-3-642-29011-4_22"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"crossref","unstructured":"Amos Fiat and Adi Shamir . How to prove yourself: Practical solutions to identification and signature problems . In Andrew M. Odlyzko editor CRYPTO'86 volume 263 of LNCS pages 186 -- 194 . Springer Heidelberg August 1987 . Amos Fiat and Adi Shamir. How to prove yourself: Practical solutions to identification and signature problems. In Andrew M. Odlyzko editor CRYPTO'86 volume 263 of LNCS pages 186--194. Springer Heidelberg August 1987.","DOI":"10.1007\/3-540-47721-7_12"},{"key":"e_1_3_2_2_19_1","volume-title":"The Ristretto group","author":"Hamburg Mike","year":"2019","unstructured":"Mike Hamburg , Henry de Valence , Isis Lovecruft , and Tony Arcieri . The Ristretto group , 2019 . https:\/\/ristretto.group\/. Mike Hamburg, Henry de Valence, Isis Lovecruft, and Tony Arcieri. The Ristretto group, 2019. https:\/\/ristretto.group\/."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2104"},{"key":"e_1_3_2_2_21_1","volume-title":"September","author":"Lund Joshua","year":"2017","unstructured":"Joshua Lund . Encrypted profiles for Signal now in public beta , September 2017 . https:\/\/signal.org\/blog\/signal-profiles-beta\/. Joshua Lund. Encrypted profiles for Signal now in public beta, September 2017. https:\/\/signal.org\/blog\/signal-profiles-beta\/."},{"key":"e_1_3_2_2_22_1","volume-title":"May","author":"Marlinspike Moxie","year":"2014","unstructured":"Moxie Marlinspike . Private group messaging , May 2014 . https:\/\/signal.org\/blog\/private-groups\/. Moxie Marlinspike. Private group messaging, May 2014. https:\/\/signal.org\/blog\/private-groups\/."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"crossref","unstructured":"Moni Naor Benny Pinkas and Omer Reingold . Distributed pseudo-random functions and KDCs . In Jacques Stern editor EUROCRYPT'99 volume 1592 of LNCS pages 327 -- 346 . Springer Heidelberg May 1999 . Moni Naor Benny Pinkas and Omer Reingold. Distributed pseudo-random functions and KDCs. In Jacques Stern editor EUROCRYPT'99 volume 1592 of LNCS pages 327--346. Springer Heidelberg May 1999.","DOI":"10.1007\/3-540-48910-X_23"},{"key":"e_1_3_2_2_24_1","volume-title":"U-prove cryptographic specification v1.1 (revision 2)","author":"Paquin C.","year":"2013","unstructured":"C. Paquin and G. Zaverucha . U-prove cryptographic specification v1.1 (revision 2) , 2013 . Available online: www.microsoft.com\/uprove. C. Paquin and G. Zaverucha. U-prove cryptographic specification v1.1 (revision 2), 2013. Available online: www.microsoft.com\/uprove."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-14439-9","volume-title":"Attribute-based credentials for trust, identity in the information society","author":"Rannenberg Kai","year":"2015","unstructured":"Kai Rannenberg , Jan Camenisch , and Ahmad Sabouri (Editors). Attribute-based credentials for trust, identity in the information society . Springer , 2015 . https:\/\/doi.org\/10.1007\/978--3--319--14439--9. 10.1007\/978--3--319--14439--9 Kai Rannenberg, Jan Camenisch, and Ahmad Sabouri (Editors). Attribute-based credentials for trust, identity in the information society. Springer, 2015. https:\/\/doi.org\/10.1007\/978--3--319--14439--9."},{"key":"e_1_3_2_2_28_1","volume-title":"Technical information (specifications and software libraries)","year":"2019","unstructured":"Signal. Technical information (specifications and software libraries) , 2019 . https:\/\/www.signal.org\/docs\/. Signal. Technical information (specifications and software libraries), 2019. https:\/\/www.signal.org\/docs\/."}],"event":{"name":"CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event USA","acronym":"CCS '20","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372297.3417887","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3372297.3417887","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:32Z","timestamp":1750197692000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372297.3417887"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,30]]},"references-count":24,"alternative-id":["10.1145\/3372297.3417887","10.1145\/3372297"],"URL":"https:\/\/doi.org\/10.1145\/3372297.3417887","relation":{},"subject":[],"published":{"date-parts":[[2020,10,30]]},"assertion":[{"value":"2020-11-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}