{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T12:31:08Z","timestamp":1770726668985,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":89,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000028","name":"Semiconductor Research Corporation","doi-asserted-by":"publisher","award":["CONIX Research Center - JUMP"],"award-info":[{"award-number":["CONIX Research Center - JUMP"]}],"id":[{"id":"10.13039\/100000028","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["N66001-15-C-4065"],"award-info":[{"award-number":["N66001-15-C-4065"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,7]]},"DOI":"10.1145\/3427228.3427231","type":"proceedings-article","created":{"date-parts":[[2020,12,9]],"date-time":"2020-12-09T22:20:18Z","timestamp":1607552418000},"page":"84-99","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Talek: Private Group Messaging with Hidden Access Patterns"],"prefix":"10.1145","author":[{"given":"Raymond","family":"Cheng","sequence":"first","affiliation":[{"name":"University of Washington"}]},{"given":"William","family":"Scott","sequence":"additional","affiliation":[{"name":"University of Washington"}]},{"given":"Elisaweta","family":"Masserova","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Irene","family":"Zhang","sequence":"additional","affiliation":[{"name":"Microsoft Research, United States of America"}]},{"given":"Vipul","family":"Goyal","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, United States of America"}]},{"given":"Thomas","family":"Anderson","sequence":"additional","affiliation":[{"name":"University of Washington, United States of America"}]},{"given":"Arvind","family":"Krishnamurthy","sequence":"additional","affiliation":[{"name":"University of Washington"}]},{"given":"Bryan","family":"Parno","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2020,12,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2015. New Data Shows Mobile Data Consumption Skyrocketing Following Snapchat Discover\u00e2\u20ac\u2122s Launch. techcrunch.com.  2015. New Data Shows Mobile Data Consumption Skyrocketing Following Snapchat Discover\u00e2\u20ac\u2122s Launch. techcrunch.com."},{"key":"e_1_3_2_1_2_1","unstructured":"2016. Pond. github.com\/agl\/pond.  2016. Pond. github.com\/agl\/pond."},{"key":"e_1_3_2_1_3_1","unstructured":"2016. Ubuntu IRC Logs. https:\/\/irclogs.ubuntu.com\/.  2016. Ubuntu IRC Logs. https:\/\/irclogs.ubuntu.com\/."},{"key":"e_1_3_2_1_4_1","unstructured":"2017. Ricochet: Anonymous peer-to-peer instant messaging. github.com\/ricochet-im\/ricochet.  2017. Ricochet: Anonymous peer-to-peer instant messaging. github.com\/ricochet-im\/ricochet."},{"key":"e_1_3_2_1_5_1","unstructured":"2018. Keybase. https:\/\/keybase.io\/.  2018. Keybase. https:\/\/keybase.io\/."},{"key":"e_1_3_2_1_6_1","unstructured":"2018. Signal Privacy Policy. whispersystems.org.  2018. Signal Privacy Policy. whispersystems.org."},{"key":"e_1_3_2_1_7_1","volume-title":"XPIR: Private information retrieval for everyone. Privacy Enhancing Technologies(2016).","author":"Aguilar-Melchor Carlos","year":"2016","unstructured":"Carlos Aguilar-Melchor , Joris Barrier , Laurent Fousse , and Marc-Olivier Killijian . 2016 . XPIR: Private information retrieval for everyone. Privacy Enhancing Technologies(2016). Carlos Aguilar-Melchor, Joris Barrier, Laurent Fousse, and Marc-Olivier Killijian. 2016. XPIR: Private information retrieval for everyone. Privacy Enhancing Technologies(2016)."},{"key":"e_1_3_2_1_8_1","volume-title":"26th USENIX Security Symposium. 1217\u20131234","author":"Alexopoulos Nikolaos","year":"2017","unstructured":"Nikolaos Alexopoulos , Aggelos Kiayias , Riivo Talviste , and Thomas Zacharias . 2017 . MCMix: Anonymous messaging via secure multiparty computation . In 26th USENIX Security Symposium. 1217\u20131234 . Nikolaos Alexopoulos, Aggelos Kiayias, Riivo Talviste, and Thomas Zacharias. 2017. MCMix: Anonymous messaging via secure multiparty computation. In 26th USENIX Security Symposium. 1217\u20131234."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00062"},{"key":"e_1_3_2_1_10_1","unstructured":"Sebastian Angel and Srinath Setty. 2016. Unobservable Communication over Fully Untrusted Infrastructure. In Operating Systems Design and Implementation. USENIX.  Sebastian Angel and Srinath Setty. 2016. Unobservable Communication over Fully Untrusted Infrastructure. In Operating Systems Design and Implementation. USENIX."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34931-7_28"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44598-6_4"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68697-5_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0055718"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33481-8_9"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455823"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44647-8_13"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39200-9_26"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0008"},{"key":"e_1_3_2_1_20_1","volume-title":"Efficient Anonymity-Preserving Data Collection. In International Conference on Knowledge Discovery and Data Mining. ACM.","author":"Brickell Justin","year":"2006","unstructured":"Justin Brickell and Vitaly Shmatikov . 2006 . Efficient Anonymity-Preserving Data Collection. In International Conference on Knowledge Discovery and Data Mining. ACM. Justin Brickell and Vitaly Shmatikov. 2006. Efficient Anonymity-Preserving Data Collection. In International Conference on Knowledge Discovery and Data Mining. ACM."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/11496137_30"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00206326"},{"key":"e_1_3_2_1_23_1","volume-title":"International Conference on Applied Cryptography and Network Security. Springer, 557\u2013578","author":"Chaum David","year":"2017","unstructured":"David Chaum , Farid Javani , Aniket Kate , Anna Krasnova , Joeri de Ruiter , and Alan\u00a0 T Sherman . 2017 . cMix: Anonymization by High-Performance Scalable Mixing . In International Conference on Applied Cryptography and Network Security. Springer, 557\u2013578 . David Chaum, Farid Javani, Aniket Kate, Anna Krasnova, Joeri de Ruiter, and Alan\u00a0T Sherman. 2017. cMix: Anonymization by High-Performance Scalable Mixing. In International Conference on Applied Cryptography and Network Security. Springer, 557\u2013578."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2796314.2745875"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1995.492461"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/293347.293350"},{"key":"e_1_3_2_1_28_1","volume-title":"Riposte: An Anonymous Messaging System Handling Millions of Users. In Symposium on Security and Privacy. IEEE.","author":"Corrigan-Gibbs Henry","year":"2015","unstructured":"Henry Corrigan-Gibbs , Dan Boneh , and David Mazi\u00e8res . 2015 . Riposte: An Anonymous Messaging System Handling Millions of Users. In Symposium on Security and Privacy. IEEE. Henry Corrigan-Gibbs, Dan Boneh, and David Mazi\u00e8res. 2015. Riposte: An Anonymous Messaging System Handling Millions of Users. In Symposium on Security and Privacy. IEEE."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866346"},{"key":"e_1_3_2_1_31_1","unstructured":"Henry Corrigan-Gibbs David\u00a0Isaac Wolinsky and Bryan Ford. 2013. Proactively Accountable Anonymous Messaging in Verdict. In USENIX Security.  Henry Corrigan-Gibbs David\u00a0Isaac Wolinsky and Bryan Ford. 2013. Proactively Accountable Anonymous Messaging in Verdict. In USENIX Security."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2003.1199323"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30114-1_21"},{"key":"e_1_3_2_1_34_1","first-page":"579","article-title":"PIR-PSI: Scaling Private Contact Discovery","volume":"2018","author":"Demmler Daniel","year":"2018","unstructured":"Daniel Demmler , Peter Rindal , Mike Rosulek , and Ni Trieu . 2018 . PIR-PSI: Scaling Private Contact Discovery . IACR Cryptology ePrint Archive 2018 (2018), 579 . https:\/\/eprint.iacr.org\/2018\/579 Daniel Demmler, Peter Rindal, Mike Rosulek, and Ni Trieu. 2018. PIR-PSI: Scaling Private Contact Discovery. IACR Cryptology ePrint Archive 2018 (2018), 579. https:\/\/eprint.iacr.org\/2018\/579","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_35_1","unstructured":"Casey Devet Ian Goldberg and Nadia Heninger. 2012. Optimally Robust Private Information Retrieval. In USENIX Security.  Casey Devet Ian Goldberg and Nadia Heninger. 2012. Optimally Robust Private Information Retrieval. In USENIX Security."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2007.02.054"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251396"},{"key":"e_1_3_2_1_38_1","volume-title":"Phalanx: Withstanding Multimillion-Node Botnets. In USENIX Symposium on Networked Systems Design and Implementation.","author":"Dixon Colin","year":"2008","unstructured":"Colin Dixon , Thomas\u00a0 E Anderson , and Arvind Krishnamurthy . 2008 . Phalanx: Withstanding Multimillion-Node Botnets. In USENIX Symposium on Networked Systems Design and Implementation. Colin Dixon, Thomas\u00a0E Anderson, and Arvind Krishnamurthy. 2008. Phalanx: Withstanding Multimillion-Node Botnets. In USENIX Symposium on Networked Systems Design and Implementation."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Cynthia Dwork. 2006. Differential Privacy. In Automata languages and programming. 1\u201312.  Cynthia Dwork. 2006. Differential Privacy. In Automata languages and programming. 1\u201312.","DOI":"10.1007\/11787006_1"},{"key":"e_1_3_2_1_40_1","volume-title":"Differential Privacy: A Survey of Results. In Theory and applications of models of computation. 1\u201319.","author":"Dwork Cynthia","year":"2008","unstructured":"Cynthia Dwork . 2008 . Differential Privacy: A Survey of Results. In Theory and applications of models of computation. 1\u201319. Cynthia Dwork. 2008. Differential Privacy: A Survey of Results. In Theory and applications of models of computation. 1\u201319."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1987.13705"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44647-8_22"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.23"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28416"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/233551.233553"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_27"},{"key":"e_1_3_2_1_49_1","unstructured":"Ceki G\u00fclc\u00fc and Gene Tsudik. 1996. Mixing E-mail with Babel. In Network and Distributed System Security. ISOC.  Ceki G\u00fclc\u00fc and Gene Tsudik. 1996. Mixing E-mail with Babel. In Network and Distributed System Security. ISOC."},{"key":"e_1_3_2_1_50_1","unstructured":"Trinabh Gupta Natacha Crooks Whitney Mulhern Srinath\u00a0TV Setty Lorenzo Alvisi and Michael Walfish. 2016. Scalable and Private Media Consumption with Popcorn. In Symposium on Networked Systems Design and Implementation. USENIX. https:\/\/www.usenix.org\/conference\/nsdi16\/technical-sessions\/presentation\/gupta-trinabh  Trinabh Gupta Natacha Crooks Whitney Mulhern Srinath\u00a0TV Setty Lorenzo Alvisi and Michael Walfish. 2016. Scalable and Private Media Consumption with Popcorn. In Symposium on Networked Systems Design and Implementation. USENIX. https:\/\/www.usenix.org\/conference\/nsdi16\/technical-sessions\/presentation\/gupta-trinabh"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70630-4_3"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/990064.990087"},{"key":"e_1_3_2_1_53_1","unstructured":"Mohammad\u00a0Saiful Islam Mehmet Kuzu and Murat Kantarcioglu. 2012. Access Pattern disclosure on Searchable Encryption: Ramification Attack and Mitigation.. In NDSS Vol.\u00a020. 12.  Mohammad\u00a0Saiful Islam Mehmet Kuzu and Murat Kantarcioglu. 2012. Access Pattern disclosure on Searchable Encryption: Ramification Attack and Mitigation.. In NDSS Vol.\u00a020. 12."},{"key":"e_1_3_2_1_54_1","first-page":"495","article-title":"Real-time Mixes: A Bandwidth-Efficient Anonymity Protocol. Selected Areas in Communications","volume":"16","author":"Jerichow Anja","year":"1998","unstructured":"Anja Jerichow , Jan Muller , Andreas Pfitzmann , Birgit Pfitzmann , and Michael Waidner . 1998 . Real-time Mixes: A Bandwidth-Efficient Anonymity Protocol. Selected Areas in Communications , IEEE Journal on 16 , 4(1998), 495 \u2013 509 . Anja Jerichow, Jan Muller, Andreas Pfitzmann, Birgit Pfitzmann, and Michael Waidner. 1998. Real-time Mixes: A Bandwidth-Efficient Anonymity Protocol. Selected Areas in Communications, IEEE Journal on 16, 4(1998), 495\u2013509.","journal-title":"IEEE Journal on"},{"key":"e_1_3_2_1_55_1","unstructured":"Nicholas Jones Matvey Arye Jacopo Cesareo and Michael\u00a0J Freedman. 2011. Hiding Amongst the Clouds: A Proposal for Cloud-based Onion Routing. In FOCI.  Nicholas Jones Matvey Arye Jacopo Cesareo and Michael\u00a0J Freedman. 2011. Hiding Amongst the Clouds: A Proposal for Cloud-based Onion Routing. In FOCI."},{"key":"e_1_3_2_1_56_1","volume-title":"Limits of Anonymity in Open Environments. In International Workshop on Information Hiding. 53\u201369","author":"Kedogan Dogan","year":"2002","unstructured":"Dogan Kedogan , Dakshi Agrawal , and Stefan Penz . 2002 . Limits of Anonymity in Open Environments. In International Workshop on Information Hiding. 53\u201369 . Dogan Kedogan, Dakshi Agrawal, and Stefan Penz. 2002. Limits of Anonymity in Open Environments. In International Workshop on Information Hiding. 53\u201369."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1997.646125"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132755"},{"key":"e_1_3_2_1_59_1","volume-title":"XRD: Scalable Messaging System with Cryptographic Privacy. In To appear in Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI).","author":"Kwon Albert","year":"2020","unstructured":"Albert Kwon , David Lu , and Srinivas Devadas . 2020 . XRD: Scalable Messaging System with Cryptographic Privacy. In To appear in Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI). Albert Kwon, David Lu, and Srinivas Devadas. 2020. XRD: Scalable Messaging System with Cryptographic Privacy. In To appear in Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI)."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0008"},{"key":"e_1_3_2_1_61_1","volume-title":"Proceedings of USENIX Symposium on Operating Systems Design and Implementation (OSDI). 711\u2013725","author":"Lazar David","year":"2018","unstructured":"David Lazar , Yossi Gilad , and Nickolai Zeldovich . 2018 . Karaoke: Distributed private messaging immune to passive traffic analysis . In Proceedings of USENIX Symposium on Operating Systems Design and Implementation (OSDI). 711\u2013725 . David Lazar, Yossi Gilad, and Nickolai Zeldovich. 2018. Karaoke: Distributed private messaging immune to passive traffic analysis. In Proceedings of USENIX Symposium on Operating Systems Design and Implementation (OSDI). 711\u2013725."},{"key":"e_1_3_2_1_62_1","volume-title":"Alpenhorn: Bootstrapping secure communication without leaking metadata. In Operating Systems Design and Implementation. USENIX.","author":"Lazar David","year":"2016","unstructured":"David Lazar and Nickolai Zeldovich . 2016 . Alpenhorn: Bootstrapping secure communication without leaking metadata. In Operating Systems Design and Implementation. USENIX. David Lazar and Nickolai Zeldovich. 2016. Alpenhorn: Bootstrapping secure communication without leaking metadata. In Operating Systems Design and Implementation. USENIX."},{"key":"e_1_3_2_1_63_1","volume-title":"Cwtch: Privacy Preserving Infrastructure for Asynchronous, Decentralized, Multi-Party and Metadata Resistant Applications. https:\/\/cwtch.im\/.","author":"Lewis Sarah\u00a0Jamie","year":"2018","unstructured":"Sarah\u00a0Jamie Lewis . 2018 . Cwtch: Privacy Preserving Infrastructure for Asynchronous, Decentralized, Multi-Party and Metadata Resistant Applications. https:\/\/cwtch.im\/. Sarah\u00a0Jamie Lewis. 2018. Cwtch: Privacy Preserving Infrastructure for Asynchronous, Decentralized, Multi-Party and Metadata Resistant Applications. https:\/\/cwtch.im\/."},{"key":"e_1_3_2_1_64_1","volume-title":"SUNDR: Secure Untrusted Data Repository. In USENIX Symposium on Operating Systems Design and Implementation.","author":"Li Jinyuan","year":"2004","unstructured":"Jinyuan Li , Maxwell Krohn , David Mazieres , and Dennis Shasha . 2004 . SUNDR: Secure Untrusted Data Repository. In USENIX Symposium on Operating Systems Design and Implementation. Jinyuan Li, Maxwell Krohn, David Mazieres, and Dennis Shasha. 2004. SUNDR: Secure Untrusted Data Repository. In USENIX Symposium on Operating Systems Design and Implementation."},{"key":"e_1_3_2_1_65_1","volume-title":"Sublinear Scaling for Multi-Client Private Information Retrieval. In International Conference on Financial Cryptography and Data Security. 168\u2013186","author":"Lueks Wouter","year":"2015","unstructured":"Wouter Lueks and Ian Goldberg . 2015 . Sublinear Scaling for Multi-Client Private Information Retrieval. In International Conference on Financial Cryptography and Data Security. 168\u2013186 . Wouter Lueks and Ian Goldberg. 2015. Sublinear Scaling for Multi-Client Private Information Retrieval. In International Conference on Financial Cryptography and Data Security. 168\u2013186."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063509.2063512"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"crossref","unstructured":"Nick Mathewson and Roger Dingledine. 2004. Practical Traffic Analysis: Extending and Resisting Statistical Disclosure. In Privacy Enhancing Technologies.  Nick Mathewson and Roger Dingledine. 2004. Practical Traffic Analysis: Extending and Resisting Statistical Disclosure. In Privacy Enhancing Technologies.","DOI":"10.1007\/11423409_2"},{"key":"e_1_3_2_1_68_1","unstructured":"Susan\u00a0E McGregor Polina Charters Tobin Holliday and Franziska Roesner. 2015. Investigating the Computer Security Practices and Needs of Journalists.. In USENIX Security.  Susan\u00a0E McGregor Polina Charters Tobin Holliday and Franziska Roesner. 2015. Investigating the Computer Security Practices and Needs of Journalists.. In USENIX Security."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"crossref","unstructured":"Susan\u00a0E McGregor Franziska Roesner and Kelly Caine. 2016. Individual versus Organizational Computer Security and Privacy Concerns in Journalism. Privacy Enhancing Technologies(2016).  Susan\u00a0E McGregor Franziska Roesner and Kelly Caine. 2016. Individual versus Organizational Computer Security and Privacy Concerns in Journalism. Privacy Enhancing Technologies(2016).","DOI":"10.1515\/popets-2016-0048"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"crossref","unstructured":"Michael Mitzenmacher. 2002. Compressed bloom filters. Transactions on Networking(2002).  Michael Mitzenmacher. 2002. Compressed bloom filters. Transactions on Networking(2002).","DOI":"10.1145\/383962.384004"},{"key":"e_1_3_2_1_71_1","volume-title":"VoteHere","author":"Neff C\u00a0Andrew","year":"2003","unstructured":"C\u00a0Andrew Neff . 2003. Verifiable Mixing (Shuffling) of ElGamal Pairs . http:\/\/www.votehere.net\/vhti\/documentation\/egshuf.pdf. VHTi Technical Document , VoteHere , Inc( 2003 ). C\u00a0Andrew Neff. 2003. Verifiable Mixing (Shuffling) of ElGamal Pairs. http:\/\/www.votehere.net\/vhti\/documentation\/egshuf.pdf. VHTi Technical Document, VoteHere, Inc(2003)."},{"key":"e_1_3_2_1_72_1","volume-title":"Efficient Computation on Oblivious RAMs. In Symposium on Theory of Computing. ACM.","author":"Ostrovsky Rafail","year":"1990","unstructured":"Rafail Ostrovsky . 1990 . Efficient Computation on Oblivious RAMs. In Symposium on Theory of Computing. ACM. Rafail Ostrovsky. 1990. Efficient Computation on Oblivious RAMs. In Symposium on Theory of Computing. ACM."},{"key":"e_1_3_2_1_73_1","volume-title":"Private Information Storage. In Symposium on Theory of Computing. ACM. https:\/\/doi.org\/10","author":"Ostrovsky Rafail","year":"1997","unstructured":"Rafail Ostrovsky and Victor Shoup . 1997 . Private Information Storage. In Symposium on Theory of Computing. ACM. https:\/\/doi.org\/10 .1145\/258533.258606 10.1145\/258533.258606 Rafail Ostrovsky and Victor Shoup. 1997. Private Information Storage. In Symposium on Theory of Computing. ACM. https:\/\/doi.org\/10.1145\/258533.258606"},{"key":"e_1_3_2_1_74_1","volume-title":"Cuckoo Hashing. In European Symposium on Algorithms. 121\u2013133","author":"Pagh Rasmus","year":"2001","unstructured":"Rasmus Pagh and Flemming\u00a0Friche Rodler . 2001 . Cuckoo Hashing. In European Symposium on Algorithms. 121\u2013133 . Rasmus Pagh and Flemming\u00a0Friche Rodler. 2001. Cuckoo Hashing. In European Symposium on Algorithms. 121\u2013133."},{"key":"e_1_3_2_1_75_1","unstructured":"Andreas Pfitzmann and Marit Hansen. 2010. A terminology for talking about privacy by data minimization: Anonymity unlinkability undetectability unobservability pseudonymity and identity management (Version 0.34). https:\/\/dud.inf.tu-dresden.de\/literatur\/Anon_Terminology_v0.34.pdf.  Andreas Pfitzmann and Marit Hansen. 2010. A terminology for talking about privacy by data minimization: Anonymity unlinkability undetectability unobservability pseudonymity and identity management (Version 0.34). https:\/\/dud.inf.tu-dresden.de\/literatur\/Anon_Terminology_v0.34.pdf."},{"key":"e_1_3_2_1_76_1","volume-title":"26th USENIX Security Symposium. 1199\u20131216","author":"Piotrowska M","year":"2017","unstructured":"Ania\u00a0 M Piotrowska , Jamie Hayes , Tariq Elahi , Sebastian Meiser , and George Danezis . 2017 . The Loopix anonymity system . In 26th USENIX Security Symposium. 1199\u20131216 . Ania\u00a0M Piotrowska, Jamie Hayes, Tariq Elahi, Sebastian Meiser, and George Danezis. 2017. The Loopix anonymity system. In 26th USENIX Security Symposium. 1199\u20131216."},{"key":"e_1_3_2_1_77_1","unstructured":"Michael\u00a0G Reed Paul\u00a0F Syverson and David\u00a0M Goldschlag. 1998. Anonymous Connections and Onion Routing. Selected Areas in Communications(1998).  Michael\u00a0G Reed Paul\u00a0F Syverson and David\u00a0M Goldschlag. 1998. Anonymous Connections and Onion Routing. Selected Areas in Communications(1998)."},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA606588"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102199.1102201"},{"key":"e_1_3_2_1_80_1","volume-title":"Simple Encrypted Arithmetic Library (release 3.1.0). https:\/\/github.com\/Microsoft\/SEAL. Microsoft Research","author":"SEAL","unstructured":"SEAL 2018. Simple Encrypted Arithmetic Library (release 3.1.0). https:\/\/github.com\/Microsoft\/SEAL. Microsoft Research , Redmond, WA . SEAL 2018. Simple Encrypted Arithmetic Library (release 3.1.0). https:\/\/github.com\/Microsoft\/SEAL. Microsoft Research, Redmond, WA."},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133572.1133611"},{"key":"e_1_3_2_1_82_1","volume-title":"Multi-Cloud Oblivious Storage. In SIGSAC conference on Computer & Communications security. ACM.","author":"Stefanov Emil","year":"2013","unstructured":"Emil Stefanov and Elaine Shi . 2013 . Multi-Cloud Oblivious Storage. In SIGSAC conference on Computer & Communications security. ACM. Emil Stefanov and Elaine Shi. 2013. Multi-Cloud Oblivious Storage. In SIGSAC conference on Computer & Communications security. ACM."},{"key":"e_1_3_2_1_83_1","volume-title":"Security and Privacy","author":"Stefanov Emil","unstructured":"Emil Stefanov and Elaine Shi . 2013. ObliviStore: High Performance Oblivious Cloud Storage . In Security and Privacy . IEEE. Emil Stefanov and Elaine Shi. 2013. ObliviStore: High Performance Oblivious Cloud Storage. In Security and Privacy. IEEE."},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516660"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_3_2_1_86_1","volume-title":"These Were The Most Downloaded And Profitable Games and Apps Of","author":"Tobin Anna","year":"2018","unstructured":"Anna Tobin . 2018. These Were The Most Downloaded And Profitable Games and Apps Of 2018 . https:\/\/www.forbes.com\/sites\/annatobin\/2018\/12\/21\/these-were-the-most-downloaded-and-profitable-games-and-apps-of-2018\/. Anna Tobin. 2018. These Were The Most Downloaded And Profitable Games and Apps Of 2018. https:\/\/www.forbes.com\/sites\/annatobin\/2018\/12\/21\/these-were-the-most-downloaded-and-profitable-games-and-apps-of-2018\/."},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132783"},{"key":"e_1_3_2_1_88_1","volume-title":"Security and Privacy","author":"Unger Nik","unstructured":"Nik Unger , Sergej Dechand , Joseph Bonneau , Sascha Fahl , Henning Perl , Ian Goldberg , and Matthew Smith . 2015. SoK: Secure Messaging . In Security and Privacy . IEEE. Nik Unger, Sergej Dechand, Joseph Bonneau, Sascha Fahl, Henning Perl, Ian Goldberg, and Matthew Smith. 2015. SoK: Secure Messaging. In Security and Privacy. IEEE."},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815417"},{"key":"e_1_3_2_1_90_1","unstructured":"David\u00a0Isaac Wolinsky Henry Corrigan-Gibbs Bryan Ford and Aaron Johnson. 2012. Dissent in Numbers: Making Strong Anonymity Scale. In Operating Systems Design and Implementation. USENIX.  David\u00a0Isaac Wolinsky Henry Corrigan-Gibbs Bryan Ford and Aaron Johnson. 2012. Dissent in Numbers: Making Strong Anonymity Scale. In Operating Systems Design and Implementation. USENIX."},{"key":"e_1_3_2_1_91_1","volume-title":"Proceedings of the European Workshop on System Security (EuroSec).","author":"Wolinsky David\u00a0Isaac","year":"2012","unstructured":"David\u00a0Isaac Wolinsky , Henry Corrigan-Gibbs , Bryan Ford , and Aaron Johnson . 2012 . Scalable anonymous group communication in the anytrust model . In Proceedings of the European Workshop on System Security (EuroSec). David\u00a0Isaac Wolinsky, Henry Corrigan-Gibbs, Bryan Ford, and Aaron Johnson. 2012. Scalable anonymous group communication in the anytrust model. In Proceedings of the European Workshop on System Security (EuroSec)."}],"event":{"name":"ACSAC '20: Annual Computer Security Applications Conference","location":"Austin USA","acronym":"ACSAC '20"},"container-title":["Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427231","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3427228.3427231","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3427228.3427231","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:24Z","timestamp":1750197744000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427231"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,7]]},"references-count":89,"alternative-id":["10.1145\/3427228.3427231","10.1145\/3427228"],"URL":"https:\/\/doi.org\/10.1145\/3427228.3427231","relation":{},"subject":[],"published":{"date-parts":[[2020,12,7]]},"assertion":[{"value":"2020-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}