{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:58:44Z","timestamp":1750309124367,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,26]],"date-time":"2023-11-26T00:00:00Z","timestamp":1700956800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100009318","name":"Helmholtz Association","doi-asserted-by":"publisher","award":["46.23"],"award-info":[{"award-number":["46.23"]}],"id":[{"id":"10.13039\/501100009318","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["90696704"],"award-info":[{"award-number":["90696704"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,26]]},"DOI":"10.1145\/3603216.3624957","type":"proceedings-article","created":{"date-parts":[[2023,11,23]],"date-time":"2023-11-23T01:38:42Z","timestamp":1700703522000},"page":"135-139","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["BAZAAR: Anonymous Resource Sharing"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5873-2859","authenticated-orcid":false,"given":"Christoph","family":"Coijanovic","sequence":"first","affiliation":[{"name":"Karlsruhe Institute of Technology, Karlsruhe, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-6357-1314","authenticated-orcid":false,"given":"Daniel","family":"Schadt","sequence":"additional","affiliation":[{"name":"Karlsruhe Institute of Technology, Karlsruhe, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9111-7348","authenticated-orcid":false,"given":"Christiane","family":"Weis","sequence":"additional","affiliation":[{"name":"NEC Laboratories Europe, Heidelberg, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8723-9692","authenticated-orcid":false,"given":"Thorsten","family":"Strufe","sequence":"additional","affiliation":[{"name":"Karlsruhe Institute of Technology, Karlsruhe, Germany"}]}],"member":"320","published-online":{"date-parts":[[2023,11,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"U. A\u00efvodji et al. 2018. Sride: a privacy-preserving ridesharing system. ACM WISEC.","DOI":"10.1145\/3212480.3212483"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Mihir Bellare et al. 1998. Relations among notions of security for public-key encryption schemes. In IACR Cryptology ePrint Archive.","DOI":"10.1007\/BFb0055718"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Roger Dingledine et al. 2004. Tor: the second-generation onion router. In USENIX Security.","DOI":"10.21236\/ADA465464"},{"key":"e_1_3_2_1_4_1","volume-title":"Annual International Cryptology Conference.","author":"Taher Elgamal","year":"1984","unstructured":"Taher Elgamal. 1984. A public key cryptosystem and a signature scheme based on discrete logarithms. In Annual International Cryptology Conference."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Philippe Golle. 2006. A private stable matching algorithm. In Financial Cryptography.","DOI":"10.1007\/11889663_5"},{"key":"e_1_3_2_1_6_1","unstructured":"Yuan Hong and Jaideep Vaidya. 2014. An inference--proof approach to privacypreserving horizontally partitioned linear programs. Optimization Letters."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Junxin Huang Yuchuan Luo Ming Xu Bowen Hu and Jian Long. 2022. Pshare: privacy-preserving ride-sharing system with minimum-detouring route. Applied Sciences.","DOI":"10.3390\/app12020842"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Andreas Klinger and Ulrike Meyer. 2023. Privacy-preserving fully online matching with deadlines. ACM CODASPY.","DOI":"10.1145\/3577923.3583654"},{"key":"e_1_3_2_1_9_1","unstructured":"Christiane Kuhn et al. 2018. On privacy notions in anonymous communication. PoPETS."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Peeter Laud and Alisa Pankova. 2013. On the (im)possibility of privately outsourcing linear programming. ACM CCSW.","DOI":"10.1145\/2517488.2517490"},{"key":"e_1_3_2_1_11_1","volume-title":"Piotrowska et al","author":"Ania M.","year":"2017","unstructured":"Ania M. Piotrowska et al. 2017. The loopix anonymity system. USENIX Security."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Sara Ramezanian et al. 2022. Lightweight privacy-preserving ride-sharing protocols for autonomous cars. ACM CSCS.","DOI":"10.1145\/3568160.3570234"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Jaideep Vaidya. 2009. Privacy-preserving linear programming. In ACM SIGAPP.","DOI":"10.1145\/1529282.1529729"},{"key":"e_1_3_2_1_14_1","unstructured":"Liehuang Zhu et al. 2017. Privacy protection using a rechargeable battery for energy consumption in smart grids. IEEE Network."}],"event":{"name":"CCS '23: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Copenhagen Denmark","acronym":"CCS '23"},"container-title":["Proceedings of the 22nd Workshop on Privacy in the Electronic Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603216.3624957","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3603216.3624957","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:49:11Z","timestamp":1750286951000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603216.3624957"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,26]]},"references-count":14,"alternative-id":["10.1145\/3603216.3624957","10.1145\/3603216"],"URL":"https:\/\/doi.org\/10.1145\/3603216.3624957","relation":{},"subject":[],"published":{"date-parts":[[2023,11,26]]},"assertion":[{"value":"2023-11-26","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}