{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T00:03:04Z","timestamp":1755993784956,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,20]],"date-time":"2023-11-20T00:00:00Z","timestamp":1700438400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"European Union?s Horizon 2020 research and innovation program","award":["No. 850990 PSOTI"],"award-info":[{"award-number":["No. 850990 PSOTI"]}]},{"name":"GRK","award":["2050 Privacy & Trust\/251805230"],"award-info":[{"award-number":["2050 Privacy & Trust\/251805230"]}]},{"name":"DFG","award":["SFB 1119 CROSSING\/236615297"],"award-info":[{"award-number":["SFB 1119 CROSSING\/236615297"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,20]]},"DOI":"10.1145\/3689943.3695051","type":"proceedings-article","created":{"date-parts":[[2024,11,21]],"date-time":"2024-11-21T18:21:04Z","timestamp":1732213264000},"page":"34-39","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Encrypted MultiChannel Communication (EMC\n            <sup>2<\/sup>\n            ): Johnny Should Use Secret Sharing"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3189-8066","authenticated-orcid":false,"given":"Gowri R.","family":"Chandran","sequence":"first","affiliation":[{"name":"Technical University of Darmstadt, Darmstadt, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3792-494X","authenticated-orcid":false,"given":"Kilian","family":"Demuth","sequence":"additional","affiliation":[{"name":"Technical University of Darmstadt, Darmstadt, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-8448-1540","authenticated-orcid":false,"given":"Kasra","family":"Edalatnejad","sequence":"additional","affiliation":[{"name":"Technical University of Darmstadt, Darmstadt, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5211-6166","authenticated-orcid":false,"given":"Sebastian","family":"Linsner","sequence":"additional","affiliation":[{"name":"Technical University of Darmstadt, Darmstadt, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1920-038X","authenticated-orcid":false,"given":"Christian","family":"Reuter","sequence":"additional","affiliation":[{"name":"Technical University of Darmstadt, Darmstadt, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8090-1316","authenticated-orcid":false,"given":"Thomas","family":"Schneider","sequence":"additional","affiliation":[{"name":"Technical University of Darmstadt, Darmstadt, German"}]}],"member":"320","published-online":{"date-parts":[[2024,11,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17653-2_5"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00062"},{"key":"e_1_3_2_1_3_1","volume-title":"USENIX OSDI","author":"Angel Sebastian","year":"2016","unstructured":"Sebastian Angel and Srinath T. V. Setty. Unobservable communication over fully untrusted infrastructure. In USENIX OSDI, 2016."},{"key":"e_1_3_2_1_4_1","unstructured":"AutoCrypt Project. Autocrypt: E-mail encryption settings discovery. https: \/\/autocrypt.org."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC9420"},{"key":"e_1_3_2_1_6_1","unstructured":"Bird. Bird - omnichannel communication solutions. https:\/\/www.bird.com."},{"key":"e_1_3_2_1_7_1","unstructured":"Briarproject. Briar: Secure messaging anywhere. https:\/\/www.briarproject.org."},{"key":"e_1_3_2_1_8_1","volume-title":"ESORICS","author":"Chandran Gowri R.","year":"2023","unstructured":"Gowri R. Chandran, Raine Nieminen, Thomas Schneider, and Ajith Suresh. Privmail: A privacy-preserving framework for secure emails. In ESORICS, 2023."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"e_1_3_2_1_10_1","volume-title":"Riposte: An anonymous messaging system handling millions of users","author":"Corrigan-Gibbs Henry","year":"2015","unstructured":"Henry Corrigan-Gibbs, Dan Boneh, and David Mazi\u00e8res. Riposte: An anonymous messaging system handling millions of users. In IEEE S&P, 2015."},{"key":"e_1_3_2_1_11_1","volume-title":"ACM CCS","author":"Corrigan-Gibbs Henry","year":"2010","unstructured":"Henry Corrigan-Gibbs and Bryan Ford. Dissent: accountable anonymous group messaging. In ACM CCS, 2010."},{"key":"e_1_3_2_1_12_1","unstructured":"Cwtch. Surveillance Resistant Infrastructure. https:\/\/cwtch.im."},{"key":"e_1_3_2_1_13_1","volume-title":"Mixminion: Design of a type III anonymous remailer protocol","author":"Danezis George","year":"2003","unstructured":"George Danezis, Roger Dingledine, and Nick Mathewson. Mixminion: Design of a type III anonymous remailer protocol. In IEEE S&P, 2003."},{"key":"e_1_3_2_1_14_1","volume-title":"Anonymity trilemma: Strong anonymity, low bandwidth overhead, low latency - choose two","author":"Das Debajyoti","year":"2018","unstructured":"Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, and Aniket Kate. Anonymity trilemma: Strong anonymity, low bandwidth overhead, low latency - choose two. In IEEE S&P, 2018."},{"key":"e_1_3_2_1_15_1","unstructured":"Datareportal. Global social media statistics. https:\/\/datareportal.com\/socialmedia-users."},{"key":"e_1_3_2_1_16_1","unstructured":"Delta Chat. Delta chat is a decentralized and secure messenger. https:\/\/delta.chat."},{"key":"e_1_3_2_1_17_1","volume-title":"USENIX Security","author":"Edalatnejad Kasra","year":"2020","unstructured":"Kasra Edalatnejad, Wouter Lueks, Julien Pierre Martin, Soline Led\u00e9sert, Anne LH\u00f4te, Bruno Thomas, Laurent Girod, and Carmela Troncoso. Datasharenetwork: A decentralized privacy-preserving search engine for investigative journalists. In USENIX Security, 2020."},{"key":"e_1_3_2_1_18_1","volume-title":"The digital markets act. https:\/\/eur-lex.europa.eu\/legalcontent\/ EN\/TXT\/uri=CELEX%3A52020PC0842","author":"European Commission","year":"2020","unstructured":"European Commission. The digital markets act. https:\/\/eur-lex.europa.eu\/legalcontent\/ EN\/TXT\/uri=CELEX%3A52020PC0842, 2020."},{"key":"e_1_3_2_1_19_1","volume-title":"Proposal for a Regulation of the European Parliament and of the Council laying down rules to prevent and combat child sexual abuse. https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=COM:2022:209:FIN","author":"European Commission","year":"2022","unstructured":"European Commission. Proposal for a Regulation of the European Parliament and of the Council laying down rules to prevent and combat child sexual abuse. https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=COM:2022:209:FIN, 2022."},{"key":"e_1_3_2_1_20_1","volume-title":"OReilly","author":"Garfinkel Simson L.","year":"1995","unstructured":"Simson L. Garfinkel. PGP - pretty good privacy: encryption for everyone. OReilly, 1995."},{"key":"e_1_3_2_1_21_1","volume-title":"Herbivore: A scalable and efficient protocol for anonymous communication. Technical report","author":"Goel Sharad","year":"2003","unstructured":"Sharad Goel, Mark Robson, Milo Polte, and Emin Sirer. Herbivore: A scalable and efficient protocol for anonymous communication. Technical report, Cornell University, 2003. http:\/\/www.cs.cornell.edu\/people\/egs\/papers\/herbivore-tr.pdf."},{"key":"e_1_3_2_1_22_1","volume-title":"Email Statistics Report","author":"Radicati Group","year":"2018","unstructured":"Radicati Group. Email Statistics Report, 2018--2022. https:\/\/www.radicati. com\/wp\/wp-content\/uploads\/2018\/01\/Email_Statistics_Report,_2018-2022_Executive_Summary.pdf."},{"key":"e_1_3_2_1_23_1","volume-title":"Email Statistics Report","author":"Radicati Group","year":"2023","unstructured":"Radicati Group. Email Statistics Report, 2023--2027. https:\/\/www.radicati. com\/wp\/wp-content\/uploads\/2023\/04\/Email-Statistics-Report-2023--2027-Executive-Summary.pdf."},{"key":"e_1_3_2_1_24_1","volume-title":"The base16, base32, and base64 data encodings. https:\/\/datatracker. ietf.org\/doc\/rfc4648","author":"Josefsson S.","year":"2006","unstructured":"S. Josefsson. The base16, base32, and base64 data encodings. https:\/\/datatracker. ietf.org\/doc\/rfc4648, 2006."},{"key":"e_1_3_2_1_25_1","unstructured":"K9 mail. Advanced email for android. https:\/\/k9mail.app."},{"key":"e_1_3_2_1_26_1","volume-title":"An analysis of the protonmail cryptographic architecture. IACR Cryptol. ePrint Arch","author":"Kobeissi Nadim","year":"2018","unstructured":"Nadim Kobeissi. An analysis of the protonmail cryptographic architecture. IACR Cryptol. ePrint Arch., 2018. Paper 2018\/1121. https:\/\/eprint.iacr.org\/2018\/1121."},{"key":"e_1_3_2_1_27_1","volume-title":"PoPETs","author":"Kwon Albert","year":"2016","unstructured":"Albert Kwon, David Lazar, Srinivas Devadas, and Bryan Ford. Riffle: An efficient communication system with strong anonymity. PoPETs, 2016."},{"key":"e_1_3_2_1_28_1","volume-title":"USENIX OSDI","author":"Lazar David","year":"2018","unstructured":"David Lazar, Yossi Gilad, and Nickolai Zeldovich. Karaoke: Distributed private messaging immune to passive traffic analysis. In USENIX OSDI, 2018."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359648"},{"key":"e_1_3_2_1_30_1","volume-title":"The Web Conference (WWW)","author":"Lee Hyunwoo","year":"2021","unstructured":"Hyunwoo Lee, Doowon Kim, and Yonghwi Kwon. TLS 1.3 in practice: How TLS 1.3 contributes to the internet. In The Web Conference (WWW), 2021."},{"key":"e_1_3_2_1_31_1","unstructured":"Matrix. Matrix: An open network for secure decentralized communication. https:\/\/matrix.org."},{"key":"e_1_3_2_1_32_1","unstructured":"XX messanger. XX messenger: Building a world where your life belongs to you. https:\/\/xx.network."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8314"},{"key":"e_1_3_2_1_34_1","unstructured":"Bussiness of apps. App statistics: Messaging apps. https:\/\/www.businessofapps. com."},{"key":"e_1_3_2_1_35_1","volume-title":"USENIX Security","author":"Piotrowska Ania M.","year":"2017","unstructured":"Ania M. Piotrowska, Jamie Hayes, Tariq Elahi, Sebastian Meiser, and George Danezis. The loopix anonymity system. In USENIX Security, 2017."},{"key":"e_1_3_2_1_36_1","unstructured":"Proton. Proton Mail: Secure email that protects your privacy. https:\/\/proton.me."},{"key":"e_1_3_2_1_37_1","volume-title":"ACM TISSEC","author":"Michael","year":"1998","unstructured":"Michael K. Reiter and Aviel D. Rubin. Crowds: Anonymity for web transactions. ACM TISSEC, 1998."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8446"},{"key":"e_1_3_2_1_39_1","unstructured":"Ricochet. Ricochet Refresh: an open-source project to allow private and anonymous instant messaging. https:\/\/www.ricochetrefresh.net."},{"key":"e_1_3_2_1_40_1","volume-title":"Still Cant Encrypt: Evaluating the Usability of a Modern PGP Client. CoRR, abs\/1510.08555","author":"Ruoti Scott","year":"2015","unstructured":"Scott Ruoti, Jeff Andersen, Daniel Zappala, and Kent E. Seamons. Why Johnny Still, Still Cant Encrypt: Evaluating the Usability of a Modern PGP Client. CoRR, abs\/1510.08555, 2015. https:\/\/arxiv.org\/abs\/1510.08555."},{"key":"e_1_3_2_1_41_1","volume-title":"https:\/\/datatracker.ietf.org\/doc\/rfc8551","author":"Schaad Jim","year":"2019","unstructured":"Jim Schaad. Secure\/multipurpose internet mail extensions (s\/mime) version 4.0 message specification. https:\/\/datatracker.ietf.org\/doc\/rfc8551, 2019."},{"key":"e_1_3_2_1_42_1","unstructured":"Session. Session messenger: Send encrypted messages not metadata. https: \/\/getsession.org."},{"key":"e_1_3_2_1_43_1","unstructured":"Signal. Signal messenger. https:\/\/signal.org."},{"key":"e_1_3_2_1_44_1","unstructured":"StartMail. StartMail: Secure email that puts your privacy first. https:\/\/www. startmail.com."},{"key":"e_1_3_2_1_45_1","unstructured":"Status. Status messenger: Chat privately with friends. https:\/\/status.app\/features\/ messenger."},{"key":"e_1_3_2_1_46_1","unstructured":"Telegram. Telegram: a new era of messaging. https:\/\/telegram.org."},{"key":"e_1_3_2_1_47_1","unstructured":"Threema. Threema: The secure messenger for individuals and companies. https: \/\/threema.ch."},{"key":"e_1_3_2_1_48_1","unstructured":"Tox. Tox: A New Kind of Instant Messaging. https:\/\/tox.chat."},{"key":"e_1_3_2_1_49_1","volume-title":"The double ratchet algorithm. GitHub wiki","author":"Trevor Perrin","year":"2016","unstructured":"Perrin Trevor and Marlinspike Moxie. The double ratchet algorithm. GitHub wiki, 2016."},{"key":"e_1_3_2_1_50_1","unstructured":"Carmela Troncoso Bart Preneel et al. An open letter to the european commission: Concerns over new proposed child sexual abuse regulation. https:\/\/cdt.org\/wp-content\/uploads\/2023\/05\/2023-05--16-Letter-from-Public-Interest-Technologists.pdf 2023."},{"key":"e_1_3_2_1_51_1","unstructured":"Tuta. Tuta: Secure email made for you. https:\/\/tuta.com\/security."},{"key":"e_1_3_2_1_52_1","unstructured":"Twilio. Twilio - Communication APIs for SMS Voice Video and Authentication. https:\/\/www.twilio.com."},{"key":"e_1_3_2_1_53_1","volume-title":"118th congress. https:\/\/www. congress.gov\/bill\/118th-congress\/senate-bill\/1207","author":"United States Senate. S.1207 - earn it act of 2023","year":"2023","unstructured":"United States Senate. S.1207 - earn it act of 2023, 118th congress. https:\/\/www. congress.gov\/bill\/118th-congress\/senate-bill\/1207, 2023."},{"key":"e_1_3_2_1_54_1","volume-title":"ACM Symposium on Operating Systems Principles (SOSP)","author":"van den Hooff Jelle","year":"2015","unstructured":"Jelle van den Hooff, David Lazar, Matei Zaharia, and Nickolai Zeldovich. Vuvuzela: scalable private messaging resistant to traffic analysis. In ACM Symposium on Operating Systems Principles (SOSP), 2015."},{"key":"e_1_3_2_1_55_1","unstructured":"WhatsApp Inc. Whatsapp messenger: secure and reliable free private messaging and calling. https:\/\/www.whatsapp.com."},{"key":"e_1_3_2_1_56_1","volume-title":"USENIX Security","author":"Whitten Alma","year":"1999","unstructured":"Alma Whitten and J. Doug Tygar. Why Johnny Cant Encrypt: A Usability Evaluation of PGP 5.0. In USENIX Security, 1999."}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Salt Lake City UT USA","acronym":"CCS '24"},"container-title":["Proceedings of the 23rd Workshop on Privacy in the Electronic Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3689943.3695051","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3689943.3695051","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T02:15:56Z","timestamp":1755915356000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3689943.3695051"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,20]]},"references-count":56,"alternative-id":["10.1145\/3689943.3695051","10.1145\/3689943"],"URL":"https:\/\/doi.org\/10.1145\/3689943.3695051","relation":{},"subject":[],"published":{"date-parts":[[2023,11,20]]},"assertion":[{"value":"2024-11-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}