{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:57:08Z","timestamp":1772042228699,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,18]]},"DOI":"10.1145\/3733102.3733150","type":"proceedings-article","created":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T11:14:07Z","timestamp":1750158847000},"page":"98-107","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["MOCHA: Mixnet Optimization Considering Honest Client Anonymity"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-0223-9082","authenticated-orcid":false,"given":"Mahdi","family":"Rahimi","sequence":"first","affiliation":[{"name":"COSIC (KU Leuven), KU Leuven, Leuven, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2025,6,17]]},"reference":[{"key":"e_1_3_3_2_2_2","doi-asserted-by":"crossref","unstructured":"Iness BEN\u00a0GUIRAT Debajyoti Das and Claudia Diaz. 2023. Blending different latency traffic with beta mixing. Proceedings on Privacy Enhancing Technologies (2023).","DOI":"10.56553\/popets-2024-0059"},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1145\/3463676.3485613","volume-title":"Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society","author":"Ben\u00a0Guirat Iness","year":"2021","unstructured":"Iness Ben\u00a0Guirat, Devashish Gosain, and Claudia Diaz. 2021. Mixim: Mixnet design decisions and empirical evaluation. In Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society. 33\u201337."},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1007\/978-3-319-61204-1_28","volume-title":"Applied Cryptography and Network Security: 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings 15","author":"Chaum David","year":"2017","unstructured":"David Chaum, Debajyoti Das, Farid Javani, Aniket Kate, Anna Krasnova, Joeri De\u00a0Ruiter, and Alan\u00a0T Sherman. 2017. cMix: Mixing with minimal real-time asymmetric cryptographic operations. In Applied Cryptography and Network Security: 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings 15. Springer, 557\u2013578."},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"crossref","unstructured":"David\u00a0L Chaum. 1981. Untraceable electronic mail return addresses and digital pseudonyms. Commun. ACM 24 2 (1981) 84\u201390.","DOI":"10.1145\/358549.358563"},{"key":"e_1_3_3_2_6_2","unstructured":"Claudia Diaz. 2005. Anonymity and privacy in electronic services. Heverlee: Katholieke Universiteit Leuven. Faculteit Ingenieurswetenschappen (2005)."},{"key":"e_1_3_3_2_7_2","unstructured":"Claudia Diaz Harry Halpin and Aggelos Kiayias. 2021. The Nym Network. (2021)."},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1007\/978-3-642-14527-8_11","volume-title":"Privacy Enhancing Technologies: 10th International Symposium, PETS 2010, Berlin, Germany, July 21-23, 2010. Proceedings 10","author":"Diaz Claudia","year":"2010","unstructured":"Claudia Diaz, Steven\u00a0J Murdoch, and Carmela Troncoso. 2010. Impact of network topology on anonymity and overhead in low-latency anonymity networks. In Privacy Enhancing Technologies: 10th International Symposium, PETS 2010, Berlin, Germany, July 21-23, 2010. Proceedings 10. Springer, 184\u2013201."},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"crossref","unstructured":"Claudia D\u00edaz Len Sassaman and Evelyne Dewitte. 2004. Comparison Between Two Practical Mix Designs Pierangela Samarati Peter Y.\u00a0A. Ryan Dieter Gollmann and Refik Molva (Eds.).","DOI":"10.1007\/978-3-540-30108-0_9"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1007\/3-540-36467-6_5","volume-title":"Privacy Enhancing Technologies: Second International Workshop, PET 2002 San Francisco, CA, USA, April 14\u201315, 2002 Revised Papers","author":"Diaz Claudia","year":"2003","unstructured":"Claudia Diaz, Stefaan Seys, Joris Claessens, and Bart Preneel. 2003. Towards measuring anonymity. In Privacy Enhancing Technologies: Second International Workshop, PET 2002 San Francisco, CA, USA, April 14\u201315, 2002 Revised Papers. Springer, 54\u201368."},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586137"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"crossref","unstructured":"Iness\u00a0Ben Guirat and Claudia Diaz. 2022. Mixnet optimization methods. Proceedings on Privacy Enhancing Technologies (2022).","DOI":"10.56553\/popets-2022-0081"},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49380-8_7"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/3463676.3485614"},{"key":"e_1_3_3_2_15_2","first-page":"1199","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Piotrowska Ania\u00a0M","year":"2017","unstructured":"Ania\u00a0M Piotrowska, Jamie Hayes, Tariq Elahi, Sebastian Meiser, and George Danezis. 2017. The loopix anonymity system. In 26th USENIX Security Symposium (USENIX Security 17). 1199\u20131216."},{"key":"e_1_3_3_2_16_2","unstructured":"Python. 2013. Event discrete process based simulation for Python. https:\/\/pypi.org\/project\/simpy\/."},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/3658664.3659631"},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"crossref","unstructured":"Mahdi Rahimi. 2024. LARMix + + : Latency-Aware Routing in Mix Networks with Free Routes Topology. Cryptology ePrint Archive (2024).","DOI":"10.14722\/ndss.2024.23221"},{"key":"e_1_3_3_2_19_2","first-page":"187","volume-title":"International Conference on Cryptology and Network Security","author":"Rahimi Mahdi","year":"2024","unstructured":"Mahdi Rahimi. 2024. LARMix++: Latency-Aware Routing in Mix Networks with Free Routes Topology. In International Conference on Cryptology and Network Security. Springer, 187\u2013211."},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1109\/NCA61908.2024.00038","volume-title":"2024 22nd International Symposium on Network Computing and Applications (NCA)","author":"Rahimi Mahdi","year":"2024","unstructured":"Mahdi Rahimi. 2024. MALARIA: Management of Low-Latency Routing Impact on Mix Network Anonymity. In 2024 22nd International Symposium on Network Computing and Applications (NCA). IEEE, 193\u2013202."},{"key":"e_1_3_3_2_21_2","unstructured":"Mahdi Rahimi. 2025. MALARIA: Management of Low-Latency Routing Impact on Mix Network Anonymity (Extended Version). Cryptology ePrint Archive (2025)."},{"key":"e_1_3_3_2_22_2","volume-title":"International Conference on Applied Cryptography and Network Security","author":"Rahimi Mahdi","year":"2025","unstructured":"Mahdi Rahimi. 2025. PARSAN-Mix: Packet-Aware Routing and Shuffling with Additional Noise for Latency Optimization in Mix Networks. In International Conference on Applied Cryptography and Network Security."},{"key":"e_1_3_3_2_23_2","unstructured":"Mahdi Rahimi. 2025. PARSAN-Mix: Packet-Aware Routing and Shuffling with Additional Noise for Latency Optimization in Mix Networks (Extended Version). Cryptology ePrint Archive (2025)."},{"key":"e_1_3_3_2_24_2","volume-title":"The Network and Distributed System Security Symposium","author":"Rahimi Mahdi","year":"2024","unstructured":"Mahdi Rahimi, Piyush\u00a0Kumar Sharma, and Claudia Diaz. 2024. LARMix: Latency-Aware Routing in Mix Networks. In The Network and Distributed System Security Symposium. Internet Society."},{"key":"e_1_3_3_2_25_2","volume-title":"The Network and Distributed System Security Symposium","author":"Rahimi Mahdi","year":"2025","unstructured":"Mahdi Rahimi, Piyush\u00a0Kumar Sharma, and Claudia Diaz. 2025. LAMP: Lightweight Approaches for Latency Minimization in Mixnets with Practical Deployment Considerations. In The Network and Distributed System Security Symposium. Internet Society."},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/3-540-36467-6_4","volume-title":"Privacy Enhancing Technologies: Second International Workshop, PET 2002 San Francisco, CA, USA, April 14\u201315, 2002 Revised Papers 2","author":"Serjantov Andrei","year":"2003","unstructured":"Andrei Serjantov and George Danezis. 2003. Towards an information theoretic metric for anonymity. In Privacy Enhancing Technologies: Second International Workshop, PET 2002 San Francisco, CA, USA, April 14\u201315, 2002 Revised Papers 2. Springer, 41\u201353."},{"key":"e_1_3_3_2_27_2","doi-asserted-by":"crossref","unstructured":"Claude\u00a0E Shannon. 1949. Communication theory of secrecy systems. The Bell system technical journal 28 4 (1949) 656\u2013715.","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"crossref","unstructured":"Fatemeh Shirazi Milivoj Simeonovski Muhammad\u00a0Rizwan Asghar Michael Backes and Claudia Diaz. 2018. A survey on routing in anonymous communication protocols. ACM Computing Surveys (CSUR) 51 3 (2018) 1\u201339.","DOI":"10.1145\/3182658"}],"event":{"name":"IH&MMSEC '25: ACM Workshop on Information Hiding and Multimedia Security","location":"San Jose USA","acronym":"IH&MMSEC '25","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the ACM Workshop on Information Hiding and Multimedia Security"],"original-title":[],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T11:15:41Z","timestamp":1750158941000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3733102.3733150"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,17]]},"references-count":27,"alternative-id":["10.1145\/3733102.3733150","10.1145\/3733102"],"URL":"https:\/\/doi.org\/10.1145\/3733102.3733150","relation":{},"subject":[],"published":{"date-parts":[[2025,6,17]]},"assertion":[{"value":"2025-06-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}