{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:22:19Z","timestamp":1750220539272,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,15]],"date-time":"2021-11-15T00:00:00Z","timestamp":1636934400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001656","name":"Helmholtz-Gemeinschaft","doi-asserted-by":"publisher","award":["46.23"],"award-info":[{"award-number":["46.23"]}],"id":[{"id":"10.13039\/501100001656","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["EXC 2050\/1, Project ID 390696704"],"award-info":[{"award-number":["EXC 2050\/1, Project ID 390696704"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,15]]},"DOI":"10.1145\/3463676.3485605","type":"proceedings-article","created":{"date-parts":[[2021,11,5]],"date-time":"2021-11-05T22:07:38Z","timestamp":1636150058000},"page":"17-32","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Plausible Deniability for Anonymous Communication"],"prefix":"10.1145","author":[{"given":"Christiane","family":"Kuhn","sequence":"first","affiliation":[{"name":"Karlsruhe Institute of Technology, Karlsruhe, Germany"}]},{"given":"Maximilian","family":"Noppel","sequence":"additional","affiliation":[{"name":"Karlsruhe Institute of Technology, Karlsruhe, Germany"}]},{"given":"Christian","family":"Wressnegger","sequence":"additional","affiliation":[{"name":"Karlsruhe Institute of Technology, Karlsruhe, Germany"}]},{"given":"Thorsten","family":"Strufe","sequence":"additional","affiliation":[{"name":"Karlsruhe Institute of Technology &amp; TU Dresden, Karlsruhe, Germany"}]}],"member":"320","published-online":{"date-parts":[[2021,11,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2013.18"},{"key":"e_1_3_2_1_2_1","volume-title":"Probabilistic Anonymity. In CONCUR 2005 - Concurrency Theory, 16th International Conference, CONCUR 2005, San Francisco, CA, USA, August 23-26, 2005, Proceedings (Lecture Notes in Computer Science","volume":"185","author":"Bhargava Mohit","year":"2005","unstructured":"Mohit Bhargava and Catuscia Palamidessi . 2005 . Probabilistic Anonymity. In CONCUR 2005 - Concurrency Theory, 16th International Conference, CONCUR 2005, San Francisco, CA, USA, August 23-26, 2005, Proceedings (Lecture Notes in Computer Science , Vol. 3653),, Mart\u00edn Abadi and Luca de Alfaro (Eds.). Springer, 171-- 185 . https:\/\/doi.org\/10.1007\/11539452_16 10.1007\/11539452_16 Mohit Bhargava and Catuscia Palamidessi. 2005. Probabilistic Anonymity. In CONCUR 2005 - Concurrency Theory, 16th International Conference, CONCUR 2005, San Francisco, CA, USA, August 23-26, 2005, Proceedings (Lecture Notes in Computer Science, Vol. 3653),, Mart\u00edn Abadi and Luca de Alfaro (Eds.). Springer, 171--185. https:\/\/doi.org\/10.1007\/11539452_16"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952986"},{"key":"e_1_3_2_1_4_1","volume-title":"The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability. Journal of cryptology","author":"Chaum David","year":"1988","unstructured":"David Chaum . 1988. The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability. Journal of cryptology ( 1988 ). David Chaum. 1988. The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability. Journal of cryptology (1988)."},{"key":"e_1_3_2_1_5_1","volume-title":"Return Addresses, and Digital Pseudonyms.","author":"Chaum David L","year":"1981","unstructured":"David L Chaum . 1981. Untraceable Electronic Mail , Return Addresses, and Digital Pseudonyms. , Vol. 24 , 2 ( 1981 ), 5. David L Chaum. 1981. Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms., Vol. 24, 2 (1981), 5."},{"key":"e_1_3_2_1_6_1","volume-title":"International Workshop on Design Issues in Anonymity and Unobservability","author":"Clarke Ian","year":"2000","unstructured":"Ian Clarke , Oskar Sandberg , Brandon Wiley , and Theodore W. Hong . 2000. Freenet: A Distributed Anonymous Information Storage and Retrieval System. In Designing Privacy Enhancing Technologies , International Workshop on Design Issues in Anonymity and Unobservability , Berkeley, CA, USA, July 25--26 , 2000 , Proceedings (Lecture Notes in Computer Science, Vol. 2009), Hannes Federrath (Ed.). Springer, 46--66. https:\/\/doi.org\/10.1007\/3-540-44702-4_4 10.1007\/3-540-44702-4_4 Ian Clarke, Oskar Sandberg, Brandon Wiley, and Theodore W. Hong. 2000. Freenet: A Distributed Anonymous Information Storage and Retrieval System. In Designing Privacy Enhancing Technologies, International Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, July 25--26, 2000, Proceedings (Lecture Notes in Computer Science, Vol. 2009), Hannes Federrath (Ed.). Springer, 46--66. https:\/\/doi.org\/10.1007\/3-540-44702-4_4"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA465464"},{"key":"e_1_3_2_1_8_1","volume-title":"Quisquis: A New Design for Anonymous Cryptocurrencies. In Advances in Cryptology textendash ASIACRYPT","author":"Fauzi Prastudy","year":"2019","unstructured":"Prastudy Fauzi , Sarah Meiklejohn , Rebekah Mercer , and Claudio Orlandi . 2019 . Quisquis: A New Design for Anonymous Cryptocurrencies. In Advances in Cryptology textendash ASIACRYPT 2019, Steven D. Galbraith and Shiho Moriai (Eds.). Vol. 11921 . Springer International Publishing , Cham, 649--678. https:\/\/doi.org\/10.1007\/978-3-030-34578--5_23 10.1007\/978-3-030-34578--5_23 Prastudy Fauzi, Sarah Meiklejohn, Rebekah Mercer, and Claudio Orlandi. 2019. Quisquis: A New Design for Anonymous Cryptocurrencies. In Advances in Cryptology textendash ASIACRYPT 2019, Steven D. Galbraith and Shiho Moriai (Eds.). Vol. 11921. Springer International Publishing, Cham, 649--678. https:\/\/doi.org\/10.1007\/978-3-030-34578--5_23"},{"key":"e_1_3_2_1_9_1","volume-title":"11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12--16","volume":"71","author":"Feigenbaum Joan","year":"2007","unstructured":"Joan Feigenbaum , Aaron Johnson , and Paul F. Syverson . 2007. A Model of Onion Routing with Provable Anonymity. In Financial Cryptography and Data Security , 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12--16 , 2007 . Revised Selected Papers (Lecture Notes in Computer Science , Vol. 4886),, Sven Dietrich and Rachna Dhamija (Eds.). Springer, 57-- 71 . https:\/\/doi.org\/10.1007\/978-3-540-77366-5_9 10.1007\/978-3-540-77366-5_9 Joan Feigenbaum, Aaron Johnson, and Paul F. Syverson. 2007. A Model of Onion Routing with Provable Anonymity. In Financial Cryptography and Data Security, 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12--16, 2007. Revised Selected Papers (Lecture Notes in Computer Science, Vol. 4886),, Sven Dietrich and Rachna Dhamija (Eds.). Springer, 57--71. https:\/\/doi.org\/10.1007\/978-3-540-77366-5_9"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517850"},{"key":"e_1_3_2_1_11_1","unstructured":"Joseph Y Halpern and Kevin R O'Neill. [n.d.]. Anonymity and Information Hiding in Multiagent Systems. ([n. d.]) 14.  Joseph Y Halpern and Kevin R O'Neill. [n.d.]. Anonymity and Information Hiding in Multiagent Systems. ([n. d.]) 14."},{"volume-title":"An Indistinguishability -Based Characterization of Anonymous Channels In Privacy Enhancing Technologies,","author":"Hevia Alejandro","key":"e_1_3_2_1_12_1","unstructured":"Alejandro Hevia and Daniele Micciancio . 2008. An Indistinguishability -Based Characterization of Anonymous Channels In Privacy Enhancing Technologies, , Nikita Borisov and Ian Goldberg (Eds.). Vol. 5134 . Springer Berlin Heidelberg , Berlin, Heidelberg , 24--43. https:\/\/doi.org\/10.1007\/978-3-540-70630-4_3 10.1007\/978-3-540-70630-4_3 Alejandro Hevia and Daniele Micciancio. 2008. An Indistinguishability -Based Characterization of Anonymous Channels In Privacy Enhancing Technologies,, Nikita Borisov and Ian Goldberg (Eds.). Vol. 5134. Springer Berlin Heidelberg, Berlin, Heidelberg, 24--43. https:\/\/doi.org\/10.1007\/978-3-540-70630-4_3"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1297689.1297694"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Jon Kleinberg. 2000. The small-world phenomenon: An algorithmic perspective. In STOC.  Jon Kleinberg. 2000. The small-world phenomenon: An algorithmic perspective. In STOC.","DOI":"10.1145\/335305.335325"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0022"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417876"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5195\/LEDGER.2016.34"},{"key":"e_1_3_2_1_18_1","volume-title":"International Workshop on Design Issues in Anonymity and Unobservability","volume":"9","author":"Pfitzmann Andreas","year":"2000","unstructured":"Andreas Pfitzmann and Marit K\u00f6hntopp . 2000 . Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology. In Designing Privacy Enhancing Technologies , International Workshop on Design Issues in Anonymity and Unobservability , Berkeley, CA, USA , July 25-26, 2000, Proceedings (Lecture Notes in Computer Science, Vol. 2009), Hannes Federrath (Ed.). Springer, 1-- 9 . https:\/\/doi.org\/10.1007\/3-540-44702-4_1 10.1007\/3-540-44702-4_1 Andreas Pfitzmann and Marit K\u00f6hntopp. 2000. Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology. In Designing Privacy Enhancing Technologies, International Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, July 25-26, 2000, Proceedings (Lecture Notes in Computer Science, Vol. 2009), Hannes Federrath (Ed.). Springer, 1--9. https:\/\/doi.org\/10.1007\/3-540-44702-4_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/290163.290168"},{"key":"e_1_3_2_1_20_1","volume-title":"4th European Symposium on Research in Computer Security","author":"Steve","year":"1996","unstructured":"Steve A. Schneider and Abraham Sidiropoulos. 1996. CSP and Anonymity. In Computer Security - ESORICS 96 , 4th European Symposium on Research in Computer Security , Rome, Italy , September 25-27, 1996 , Proceedings (Lecture Notes in Computer Science, Vol. 1146),, Elisa Bertino, Helmut Kurth, Giancarlo Martella, and Emilio Montolivo (Eds.). Springer, 198--218. https:\/\/doi.org\/10.1007\/3-540-61770-1_38 10.1007\/3-540-61770-1_38 Steve A. Schneider and Abraham Sidiropoulos. 1996. CSP and Anonymity. In Computer Security - ESORICS 96, 4th European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996, Proceedings (Lecture Notes in Computer Science, Vol. 1146),, Elisa Bertino, Helmut Kurth, Giancarlo Martella, and Emilio Montolivo (Eds.). Springer, 198--218. https:\/\/doi.org\/10.1007\/3-540-61770-1_38"},{"key":"e_1_3_2_1_21_1","volume-title":"Third International Workshop, PET 2003","author":"Steinbrecher Sandra","year":"2003","unstructured":"Sandra Steinbrecher and Stefan K\u00f6psell . 2003 . Modelling Unlinkability. In Privacy Enhancing Technologies , Third International Workshop, PET 2003 , Dresden, Germany, March 26--28 , 2003, Revised Papers (Lecture Notes in Computer Science, Vol. 2760), Roger Dingledine (Ed.). Springer, 32--47. https:\/\/doi.org\/10.1007\/978-3-540-40956-4_3 10.1007\/978-3-540-40956-4_3 Sandra Steinbrecher and Stefan K\u00f6psell. 2003. Modelling Unlinkability. In Privacy Enhancing Technologies, Third International Workshop, PET 2003, Dresden, Germany, March 26--28, 2003, Revised Papers (Lecture Notes in Computer Science, Vol. 2760), Roger Dingledine (Ed.). Springer, 32--47. https:\/\/doi.org\/10.1007\/978-3-540-40956-4_3"},{"key":"e_1_3_2_1_22_1","volume-title":"Stubblebine","author":"Syverson Paul F.","year":"1999","unstructured":"Paul F. Syverson and Stuart G . Stubblebine . 1999 . Group Principals and the Formalization of Anonymity. In FM '99 - Formal Methods, World Congress on Formal Methods in the Development of Computing Systems, Toulouse, France, September 20--24, 1999, Proceedings, Volume I (Lecture Notes in Computer Science, Vol. 1708),, Jeannette M. Wing, Jim Woodcock, and Jim Davies (Eds.). Springer, 814--833. https:\/\/doi.org\/10.1007\/3-540-48119-2_45 10.1007\/3-540-48119-2_45 Paul F. Syverson and Stuart G. Stubblebine. 1999. Group Principals and the Formalization of Anonymity. In FM '99 - Formal Methods, World Congress on Formal Methods in the Development of Computing Systems, Toulouse, France, September 20--24, 1999, Proceedings, Volume I (Lecture Notes in Computer Science, Vol. 1708),, Jeannette M. Wing, Jim Woodcock, and Jim Davies (Eds.). Springer, 814--833. https:\/\/doi.org\/10.1007\/3-540-48119-2_45"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1042031.1042032"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event Republic of Korea","acronym":"CCS '21"},"container-title":["Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3463676.3485605","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3463676.3485605","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:25:08Z","timestamp":1750195508000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3463676.3485605"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,15]]},"references-count":23,"alternative-id":["10.1145\/3463676.3485605","10.1145\/3463676"],"URL":"https:\/\/doi.org\/10.1145\/3463676.3485605","relation":{},"subject":[],"published":{"date-parts":[[2021,11,15]]},"assertion":[{"value":"2021-11-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}