{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T14:44:46Z","timestamp":1773153886256,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,15]],"date-time":"2023-11-15T00:00:00Z","timestamp":1700006400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,15]]},"DOI":"10.1145\/3576915.3616615","type":"proceedings-article","created":{"date-parts":[[2023,11,21]],"date-time":"2023-11-21T12:35:13Z","timestamp":1700570113000},"page":"1-15","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["ASMesh: Anonymous and Secure Messaging in Mesh Networks Using Stronger, Anonymous Double Ratchet"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7640-4974","authenticated-orcid":false,"given":"Alexander","family":"Bienstock","sequence":"first","affiliation":[{"name":"New York University, New York, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2324-5671","authenticated-orcid":false,"given":"Paul","family":"R\u00f6sler","sequence":"additional","affiliation":[{"name":"FAU Erlangen-Nuremberg, N\u00fcrnberg, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-5949-237X","authenticated-orcid":false,"given":"Yi","family":"Tang","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,11,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Martin R. Albrecht Jorge Blasco Rikke Bjerg Jensen and Lenka Marekov\u00e1. Mesh messaging in large-scale protests: Breaking Bridgefy. In Kenneth G. Paterson editor CT-RSA 2021 volume 12704 of LNCS pages 375--398. Springer Heidelberg May 2021.","DOI":"10.1007\/978-3-030-75539-3_16"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Jo\u00ebl Alwen Sandro Coretti and Yevgeniy Dodis. The double ratchet: Security notions proofs and modularization for the Signal protocol. In Yuval Ishai and Vincent Rijmen editors EUROCRYPT 2019 Part I volume 11476 of LNCS pages 129--158. Springer Heidelberg May 2019.","DOI":"10.1007\/978-3-030-17653-2_5"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Jo\u00ebl Alwen Sandro Coretti Daniel Jost and Marta Mularczyk. Continuous group key agreement with active security. In Rafael Pass and Krzysztof Pietrzak editors TCC 2020 Part II volume 12551 of LNCS pages 261--290. Springer Heidelberg November 2020.","DOI":"10.1007\/978-3-030-64378-2_10"},{"key":"e_1_3_2_1_4_1","first-page":"269","volume-title":"Breaking bridgefy, again: Adopting libsignal is not enough","author":"Albrecht Martin R.","year":"2022","unstructured":"Martin R. Albrecht, Raphael Eikenberg, and Kenneth G. Paterson. Breaking bridgefy, again: Adopting libsignal is not enough. In Kevin R. B. Butler and Kurt Thomas, editors, USENIX Security 2022, pages 269--286. USENIX Association, August 2022."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Jo\u00ebl Alwen Daniel Jost and Marta Mularczyk. On the insider security of MLS. In Yevgeniy Dodis and Thomas Shrimpton editors CRYPTO 2022 Part II volume 13508 of LNCS pages 34--68. Springer Heidelberg August 2022.","DOI":"10.1007\/978-3-031-15979-4_2"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Alexander Bienstock Yevgeniy Dodis Sanjam Garg Garrison Grogan Mohammad Hajiabadi and Paul R\u00f6sler. On the worst-case inefficiency of CGKA. In Eike Kiltz and Vinod Vaikuntanathan editors TCC 2022 Part II volume 13748 of LNCS pages 213--243. Springer Heidelberg November 2022.","DOI":"10.1007\/978-3-031-22365-5_8"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Michael Backes Markus D\u00fcrmuth Dennis Hofheinz and Ralf K\u00fcsters. Conditional reactive simulatability. In Dieter Gollmann Jan Meier and Andrei Sabelfeld editors ESORICS 2006 volume 4189 of LNCS pages 424-- 443. Springer Heidelberg September 2006.","DOI":"10.1007\/11863908_26"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Alexander Bienstock Yevgeniy Dodis and Paul R\u00f6sler. On the price of concurrency in group ratcheting protocols. In Rafael Pass and Krzysztof Pietrzak editors TCC 2020 Part II volume 12551 of LNCS pages 198--228. Springer Heidelberg November 2020.","DOI":"10.1007\/978-3-030-64378-2_8"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Alexander Bienstock Jaiden Fairoze Sanjam Garg Pratyay Mukherjee and Srinivasan Raghuraman. A more complete analysis of the Signal double ratchet algorithm. In Yevgeniy Dodis and Thomas Shrimpton editors CRYPTO 2022 Part I volume 13507 of LNCS pages 784--813. Springer Heidelberg August 2022.","DOI":"10.1007\/978-3-031-15802-5_27"},{"key":"e_1_3_2_1_10_1","unstructured":"INC. Bridgefy. Website of bridgefy. https:\/\/bridgefy.me\/."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3616615"},{"key":"e_1_3_2_1_12_1","volume-title":"Paper 2023\/1053","author":"Bienstock Alexander","year":"2023","unstructured":"Alexander Bienstock, Paul R\u00f6sler, and Yi Tang. Asmesh: Anonymous and secure messaging in mesh networks using stronger, anonymous double ratchet. Cryptology ePrint Archive, Paper 2023\/1053, 2023. https:\/\/eprint.i acr.org\/2023\/1053."},{"key":"e_1_3_2_1_13_1","volume-title":"Proof of concept implementation of our ASMesh protocol and mesh network simulation. https:\/\/github.com\/meshmessaging\/ASMesh","author":"Bienstock Alexander","year":"2023","unstructured":"Alexander Bienstock, Paul R\u00f6sler, and Yi Tang. Proof of concept implementation of our ASMesh protocol and mesh network simulation. https:\/\/github.com\/meshmessaging\/ASMesh, 2023."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Fatih Balli Paul R\u00f6sler and Serge Vaudenay. Determining the core primitive for optimally secure ratcheting. In Shiho Moriai and Huaxiong Wang editors ASIACRYPT 2020 Part III volume 12493 of LNCS pages 621--650. Springer Heidelberg December 2020.","DOI":"10.1007\/978-3-030-64840-4_21"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/874063.875553"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-020-09360-1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Ran Canetti Palak Jain Marika Swanberg and Mayank Varia. Universally composable end-to-end secure messaging. In Yevgeniy Dodis and Thomas Shrimpton editors CRYPTO 2022 Part II volume 13508 of LNCS pages 3--33. Springer Heidelberg August 2022.","DOI":"10.1007\/978-3-031-15979-4_1"},{"key":"e_1_3_2_1_18_1","unstructured":"Cas Cremers and Mang Zhao. Provably post-quantum secure messaging with strong compromise resilience and immediate decryption. Cryptology ePrint Archive Report 2022\/1481 2022. https:\/\/eprint.iacr.org\/2022\/1481."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-20951-3_3"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Benjamin Dowling Eduard Hauck Doreen Riepel and Paul R\u00f6sler. Strongly anonymous ratcheted key exchange. In Shweta Agrawal and Dongdai Lin editors ASIACRYPT 2022 Part III volume 13793 of LNCS pages 119--150. Springer Heidelberg December 2022.","DOI":"10.1007\/978-3-031-22969-5_5"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00055"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.14722\/eurousec.2017.23016"},{"key":"e_1_3_2_1_23_1","first-page":"03","article-title":"Concealing for Freedom: The Making of Encryption","author":"Ermoshina Ksenia","year":"2022","unstructured":"Ksenia Ermoshina and Francesca Musiani. Concealing for Freedom: The Making of Encryption, Secure Messaging and Digital Liberties. 03 2022.","journal-title":"Secure Messaging and Digital Liberties."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Felix G\u00fcnther Britta Hale Tibor Jager and Sebastian Lauer. 0-RTT key exchange with full forward secrecy. In Jean-S\u00e9bastien Coron and Jesper Buus Nielsen editors EUROCRYPT 2017 Part III volume 10212 of LNCS pages 519--548. Springer Heidelberg April \/ May 2017.","DOI":"10.1007\/978-3-319-56617-7_18"},{"issue":"4","key":"e_1_3_2_1_25_1","first-page":"576","article-title":"Crypto and empire: the contradictions of counter-surveillance advocacy. Media","volume":"38","author":"G\u00fcrses Seda","year":"2016","unstructured":"Seda G\u00fcrses, Arun Kundnani, and Joris Van Hoboken. Crypto and empire: the contradictions of counter-surveillance advocacy. Media, Culture & Society, 38(4):576--590, 2016.","journal-title":"Culture & Society"},{"key":"e_1_3_2_1_26_1","first-page":"305","volume-title":"2015 IEEE Symposium on Security and Privacy","author":"Matthew","year":"2015","unstructured":"Matthew D. Green and Ian Miers. Forward secure asynchronous messaging from puncturable encryption. In 2015 IEEE Symposium on Security and Privacy, pages 305--320. IEEE Computer Society Press, May 2015."},{"key":"e_1_3_2_1_27_1","first-page":"1399","volume-title":"ACM CCS 2022","author":"Hashimoto Keitaro","year":"2022","unstructured":"Keitaro Hashimoto, Shuichi Katsumata, and Thomas Prest. How to hide MetaData in MLS-like secure group messaging: Simple, modular, and post-quantum. In Heng Yin, Angelos Stavrou, Cas Cremers, and Elaine Shi, editors, ACM CCS 2022, pages 1399--1412. ACM Press, November 2022."},{"key":"e_1_3_2_1_28_1","volume-title":"Technology preview: Sealed sender for signal. https:\/\/signal.org\/blo g\/sealed-sender\/, 10","year":"2018","unstructured":"jlund. Technology preview: Sealed sender for signal. https:\/\/signal.org\/blo g\/sealed-sender\/, 10 2018."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Daniel Jost Ueli Maurer and Marta Mularczyk. A unified and composable take on ratcheting. In Dennis Hofheinz and Alon Rosen editors TCC 2019 Part II volume 11892 of LNCS pages 180--210. Springer Heidelberg December 2019.","DOI":"10.1007\/978-3-030-36033-7_7"},{"key":"e_1_3_2_1_30_1","unstructured":"John Koetsier. Hong kong protestors using mesh messaging app china can't block: Usage up 3685%. https:\/\/www.forbes.com\/sites\/johnkoetsie r\/2019\/09\/02\/hong-kong-protestors-using-mesh-messaging-app-china-cant-block-usage-up-3685\/ 09 2019."},{"key":"e_1_3_2_1_31_1","volume-title":"Paper 2023\/386","author":"Len Julia","year":"2023","unstructured":"Julia Len, Esha Ghosh, Paul Grubbs, and Paul R\u00f6sler. Interoperability in end-to-end encrypted messaging. Cryptology ePrint Archive, Paper 2023\/386, 2023. https:\/\/eprint.iacr.org\/2023\/386."},{"key":"e_1_3_2_1_32_1","first-page":"1199","volume-title":"The loopix anonymity system","author":"Piotrowska Ania M.","year":"2017","unstructured":"Ania M. Piotrowska, Jamie Hayes, Tariq Elahi, Sebastian Meiser, and George Danezis. The loopix anonymity system. In Engin Kirda and Thomas Risten-part, editors, USENIX Security 2017, pages 1199--1216. USENIX Association, August 2017."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2022-0071"},{"key":"e_1_3_2_1_34_1","volume-title":"The double ratchet algorithm. https: \/\/signal.org\/docs\/specifications\/doubleratchet\/doubleratchet.pdf, 11","author":"Perrin Trevor","year":"2016","unstructured":"Trevor Perrin and Moxie Marlinspike. The double ratchet algorithm. https: \/\/signal.org\/docs\/specifications\/doubleratchet\/doubleratchet.pdf, 11 2016."},{"key":"e_1_3_2_1_35_1","volume-title":"The x3dh key agreement protocol. https:\/\/signal.org\/docs\/specifications\/x3dh\/x3dh.pdf, 11","author":"Perrin Trevor","year":"2016","unstructured":"Trevor Perrin and Moxie Marlinspike. The x3dh key agreement protocol. https:\/\/signal.org\/docs\/specifications\/x3dh\/x3dh.pdf, 11 2016."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Bertram Poettering and Paul R\u00f6sler. Towards bidirectional ratcheted key exchange. In Hovav Shacham and Alexandra Boldyreva editors CRYPTO 2018 Part I volume 10991 of LNCS pages 3--32. Springer Heidelberg August 2018.","DOI":"10.1007\/978-3-319-96884-1_1"},{"key":"e_1_3_2_1_37_1","volume-title":"Strong anonymity for mesh messaging","author":"Perry Neil","year":"2022","unstructured":"Neil Perry, Bruce Spang, Saba Eskandarian, and Dan Boneh. Strong anonymity for mesh messaging, 2022."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00036"},{"key":"e_1_3_2_1_39_1","volume-title":"Study for the Federal Network Agency","author":"R\u00f6sler Paul","year":"2023","unstructured":"Paul R\u00f6sler and J\u00f6rg Schwenk. Interoperability between messaging services secure - implementation of encryption. Study for the Federal Network Agency, 2023."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"Paul R\u00f6sler Daniel Slamanig and Christoph Striecks. Unique-path identity based encryption with applications to strongly secure messaging. In Carmit Hazay and Martijn Stam editors EUROCRYPT 2023 Part V volume 14008 of LNCS pages 3--34. Springer Heidelberg April 2023.","DOI":"10.1007\/978-3-031-30589-4_1"},{"key":"e_1_3_2_1_41_1","volume-title":"Encrypted messaging app signal stops working in china. https:\/\/www.reuters.com\/article\/us-china-tech-signal\/encrypted-messaging-app-signal-stops-working-in-china-idUSKBN2B8094, 03","author":"Staff Reuters","year":"2021","unstructured":"Reuters Staff. Encrypted messaging app signal stops working in china. https:\/\/www.reuters.com\/article\/us-china-tech-signal\/encrypted-messaging-app-signal-stops-working-in-china-idUSKBN2B8094, 03 2021."},{"key":"e_1_3_2_1_42_1","unstructured":"Theo von Arx and Kenneth G. Paterson. On the cryptographic fragility of the telegram ecosystem. Cryptology ePrint Archive Report 2022\/595 2022. https:\/\/eprint.iacr.org\/2022\/595."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1038\/30918"},{"key":"e_1_3_2_1_44_1","volume-title":"Despite iran's efforts to block internet, technology has helped fuel outrage. https:\/\/www.nytimes.com\/2022\/09\/29\/world\/middleeast\/iran-internet-censorship.html, 09","author":"Yee Vivian","year":"2022","unstructured":"Vivian Yee. Despite iran's efforts to block internet, technology has helped fuel outrage. https:\/\/www.nytimes.com\/2022\/09\/29\/world\/middleeast\/iran-internet-censorship.html, 09 2022."}],"event":{"name":"CCS '23: ACM SIGSAC Conference on Computer and Communications Security","location":"Copenhagen Denmark","acronym":"CCS '23","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3576915.3616615","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3576915.3616615","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T01:42:49Z","timestamp":1755740569000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3576915.3616615"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,15]]},"references-count":44,"alternative-id":["10.1145\/3576915.3616615","10.1145\/3576915"],"URL":"https:\/\/doi.org\/10.1145\/3576915.3616615","relation":{},"subject":[],"published":{"date-parts":[[2023,11,15]]},"assertion":[{"value":"2023-11-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}