{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T17:00:33Z","timestamp":1774630833995,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,13]],"date-time":"2022-11-13T00:00:00Z","timestamp":1668297600000},"content-version":"vor","delay-in-days":366,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1653110, CNS-1801479, DGE-1650441"],"award-info":[{"award-number":["CNS-1653110, CNS-1801479, DGE-1650441"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["HR001119S0076"],"award-info":[{"award-number":["HR001119S0076"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006785","name":"Google","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006785","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Tezos Foundation"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3484545","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:34Z","timestamp":1636805134000},"page":"1507-1528","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Fuzzy Message Detection"],"prefix":"10.1145","author":[{"given":"Gabrielle","family":"Beck","sequence":"first","affiliation":[{"name":"Johns Hopkins University, Baltimore, MD, USA"}]},{"given":"Julia","family":"Len","sequence":"additional","affiliation":[{"name":"Cornell University, New York City, NY, USA"}]},{"given":"Ian","family":"Miers","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]},{"given":"Matthew","family":"Green","sequence":"additional","affiliation":[{"name":"Johns Hopkins University, Baltimore, MD, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. End-to-end encryption in Find My. https:\/\/support.apple.com\/guide\/security\/end-to-end-encryption-sec60fd770ba\/web. Accessed: 2020-01-20."},{"key":"e_1_3_2_1_2_1","unstructured":"[n.d.]. How Many Bitcoin Users Are There? https:\/\/www.buybitcoinworldwide.com\/how-many-bitcoin-users\/. Accessed: 2021-04-16."},{"key":"e_1_3_2_1_3_1","unstructured":"[n.d.]. i2p. Available at https:\/\/geti2p.net."},{"key":"e_1_3_2_1_4_1","unstructured":"[n.d.]. The Monero cryptocurrency. Available at https:\/\/www.getmonero.org\/."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45353-9_12"},{"key":"e_1_3_2_1_6_1","volume-title":"DHIES: An Encryption Scheme Based on the Diffie-Hellman Problem, Contribution to IEEE P1363a","author":"Abdalla M","year":"2014","unstructured":"M Abdalla, M Bellare, and P Rogaway. 2014. DHIES: An Encryption Scheme Based on the Diffie-Hellman Problem, Contribution to IEEE P1363a, 1998."},{"key":"e_1_3_2_1_7_1","volume-title":"Advances in Cryptology -- EUROCRYPT","author":"Abe Masayuki","year":"2005","unstructured":"Masayuki Abe, Rosario Gennaro, Kaoru Kurosawa, and Victor Shoup. 2005. Tag-KEM\/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM. In Advances in Cryptology -- EUROCRYPT 2005, Ronald Cramer (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 128--146."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00468-1_21"},{"key":"e_1_3_2_1_9_1","volume-title":"12th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2016","author":"Angel Sebastian","year":"2016","unstructured":"Sebastian Angel and Srinath T. V. Setty. 2016. Unobservable Communication over Fully Untrusted Infrastructure. In 12th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2016, Savannah, GA, USA, November 2--4, 2016, Kimberly Keeton and Timothy Roscoe (Eds.). USENIX Association, 551--569. https:\/\/www.usenix.org\/conference\/osdi16\/technical-sessions\/presentation\/angel"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/100216.100287"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_33"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.36"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132769"},{"key":"e_1_3_2_1_14_1","volume-title":"Rafail Ostrovsky, and Giuseppe Persiano.","author":"Boneh Dan","year":"2004","unstructured":"Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, and Giuseppe Persiano. 2004. Public Key Encryption with Keyword Search. In EUROCRYPT. 506--522."},{"key":"e_1_3_2_1_15_1","volume-title":"Franklin","author":"Boneh Dan","year":"2001","unstructured":"Dan Boneh and Matthew K. Franklin. 2001. Identity-Based Encryption from the Weil Pairing. In CRYPTO. 213--229."},{"key":"e_1_3_2_1_16_1","volume-title":"Functional Encryption: Definitions and Challenges. In Theory of Cryptography","author":"Boneh Dan","year":"2011","unstructured":"Dan Boneh, Amit Sahai, and Brent Waters. 2011. Functional Encryption: Definitions and Challenges. In Theory of Cryptography, Yuval Ishai (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 253--273."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/3--540--44647--8_12"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0008"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78381-9_20"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0052229"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Ran Canetti Shai Halevi and Jonathan Katz. 2004. Chosen-Ciphertext Security from Identity-Based Encryption. In EUROCRYPT. 207--222.","DOI":"10.1007\/978-3-540-24676-3_13"},{"key":"e_1_3_2_1_22_1","first-page":"3","article-title":"a. Private Information Retrieval by Keywords","volume":"1998","author":"Chor Benny","year":"1998","unstructured":"Benny Chor, Niv Gilboa, and Moni Naor. 1998 a. Private Information Retrieval by Keywords. IACR Cryptol. ePrint Arch., Vol. 1998 (1998), 3. http:\/\/eprint.iacr.org\/1998\/003","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/293347.293350"},{"key":"e_1_3_2_1_24_1","volume-title":"Blind Bernoulli Trials: A Noninteractive Protocol For Hidden-Weight Coin Flips. In 28th USENIX Security Symposium (USENIX Security 19)","author":"Joseph Connor R.","year":"2019","unstructured":"R. Joseph Connor and Max Schuchard. 2019. Blind Bernoulli Trials: A Noninteractive Protocol For Hidden-Weight Coin Flips. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 1483--1500. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/connor"},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of the 13th USENIX Security Symposium, August 9--13","author":"Dingledine Roger","year":"2004","unstructured":"Roger Dingledine, Nick Mathewson, and Paul F. Syverson. 2004. Tor: The Second-Generation Onion Router. In Proceedings of the 13th USENIX Security Symposium, August 9--13, 2004, San Diego, CA, USA, Matt Blaze (Ed.). USENIX, 303--320. http:\/\/www.usenix.org\/publications\/library\/proceedings\/sec04\/tech\/dingledine.html"},{"key":"e_1_3_2_1_26_1","volume-title":"Irippuge Milinda Perera, and William E. Skeith","author":"Fazio Nelly","year":"2013","unstructured":"Nelly Fazio, Rosario Gennaro, Irippuge Milinda Perera, and William E. Skeith. 2013. Hard-Core Predicates for a Diffie-Hellman Problem over Finite Fields. In CRYPTO '13, Ran Canetti and Juan A. Garay (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 148--165."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--642--54807--9_15"},{"key":"e_1_3_2_1_28_1","volume-title":"Secure Integration of Asymmetric and Symmetric Encryption Schemes. In CRYPTO '99","volume":"1666","author":"Fujisaki Eiichiro","year":"1999","unstructured":"Eiichiro Fujisaki and Tatsuaki Okamoto. 1999. Secure Integration of Asymmetric and Symmetric Encryption Schemes. In CRYPTO '99, Vol. 1666. 537--554."},{"key":"e_1_3_2_1_29_1","unstructured":"Google. [n.d.]. Golang Elliptic Curve Library. https:\/\/golang.org\/pkg\/crypto\/elliptic\/"},{"key":"e_1_3_2_1_30_1","volume-title":"SoK: General Purpose Compilers for Secure Multi-Party Computation. In 2019 IEEE Symposium on Security and Privacy (SP). 1220--1237","author":"Hastings M.","unstructured":"M. Hastings, B. Hemenway, D. Noble, and S. Zdancewic. 2019. SoK: General Purpose Compilers for Secure Multi-Party Computation. In 2019 IEEE Symposium on Security and Privacy (SP). 1220--1237."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_30"},{"key":"e_1_3_2_1_32_1","volume-title":"International Colloquium on Automata, Languages, and Programming","author":"Kolesnikov Vladimir","unstructured":"Vladimir Kolesnikov and Thomas Schneider. 2008. Improved garbled circuit: Free XOR gates and applications. In International Colloquium on Automata, Languages, and Programming. Springer, 486--498."},{"key":"e_1_3_2_1_33_1","volume-title":"NDSS '00","author":"Krawczyk Hugo","year":"2000","unstructured":"Hugo Krawczyk and Tal Rabin. 2000. Chameleon signatures. In NDSS '00."},{"key":"e_1_3_2_1_34_1","volume-title":"12th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2016","author":"Lazar David","year":"2016","unstructured":"David Lazar and Nickolai Zeldovich. 2016. Alpenhorn: Bootstrapping Secure Communication without Leaking Metadata. In 12th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2016, Savannah, GA, USA, November 2--4, 2016, Kimberly Keeton and Timothy Roscoe (Eds.). USENIX Association, 571--586. https:\/\/www.usenix.org\/conference\/osdi16\/technical-sessions\/presentation\/lazar"},{"key":"e_1_3_2_1_35_1","unstructured":"Linda Naeun Lee. 2019. Zcash Reference Wallet Light Client Protocol. Available at https:\/\/electriccoin.co\/blog\/zcash-reference-wallet-light-client-protocol\/."},{"key":"e_1_3_2_1_36_1","unstructured":"Joshua Lund. 2017. Technology preview: Sealed sender for Signal. https:\/\/signal.org\/blog\/sealed-sender\/."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24638-1_10"},{"key":"e_1_3_2_1_38_1","unstructured":"MoneroOutreach. 2019. Monero Wallet Quickstart. Available at https:\/\/www.monerooutreach.org\/stories\/monero_wallet_quickstart.html."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5195\/ledger.2016.34"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866359"},{"key":"e_1_3_2_1_41_1","unstructured":"Sarah Jamie Lewis. 2021 a. Discreet Log 1: Anonymity Bandwidth and Fuzzytags. https:\/\/openprivacy.ca\/discreet-log\/01-anonymity-bandwidth-and-fuzzytags\/index.html"},{"key":"e_1_3_2_1_42_1","unstructured":"Sarah Jamie Lewis. 2021 b. fuzzy-tags sim git repository. Available at https:\/\/git.openprivacy.ca\/openprivacy\/fuzzytags-sim."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"crossref","unstructured":"Adi Shamir. 1984. Identity-Based Cryptosystems and Signature Schemes. In CRYPTO. 47--53.","DOI":"10.1007\/3-540-39568-7_5"},{"key":"e_1_3_2_1_44_1","first-page":"112","article-title":"A Proposal for an ISO Standard for Public Key Encryption","volume":"2001","author":"Shoup Victor","year":"2001","unstructured":"Victor Shoup. 2001. A Proposal for an ISO Standard for Public Key Encryption. IACR Crypto ePrint, Vol. 2001 (2001), 112. http:\/\/eprint.iacr.org\/2001\/112","journal-title":"IACR Crypto ePrint"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815417"},{"key":"e_1_3_2_1_46_1","volume-title":"Dissent in Numbers: Making Strong Anonymity Scale. In 10th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2012","author":"Wolinsky David Isaac","year":"2012","unstructured":"David Isaac Wolinsky, Henry Corrigan-Gibbs, Bryan Ford, and Aaron Johnson. 2012. Dissent in Numbers: Making Strong Anonymity Scale. In 10th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2012, Hollywood, CA, USA, October 8--10, 2012, Chandu Thekkath and Amin Vahdat (Eds.). USENIX Association, 179--182. https:\/\/www.usenix.org\/conference\/osdi12\/technical-sessions\/presentation\/wolinsky"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1986.25"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484545","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484545","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484545","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:53:51Z","timestamp":1763499231000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484545"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":47,"alternative-id":["10.1145\/3460120.3484545","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3484545","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}