{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:46:51Z","timestamp":1740102411231,"version":"3.37.3"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,11,21]],"date-time":"2024-11-21T00:00:00Z","timestamp":1732147200000},"content-version":"vor","delay-in-days":372,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["DGE-2139899 CNS-2120651"],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,15]]},"DOI":"10.1145\/3576915.3623161","type":"proceedings-article","created":{"date-parts":[[2023,11,21]],"date-time":"2023-11-21T17:35:13Z","timestamp":1700588113000},"page":"2915-2929","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["ELEKTRA: Efficient Lightweight multi-dEvice Key TRAnsparency"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9625-6363","authenticated-orcid":false,"given":"Julia","family":"Len","sequence":"first","affiliation":[{"name":"Cornell Tech, New York, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-8333-3942","authenticated-orcid":false,"given":"Melissa","family":"Chase","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-6937-9197","authenticated-orcid":false,"given":"Esha","family":"Ghosh","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6562-9665","authenticated-orcid":false,"given":"Daniel","family":"Jost","sequence":"additional","affiliation":[{"name":"New York University, New York, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-1424-4390","authenticated-orcid":false,"given":"Balachandar","family":"Kesavan","sequence":"additional","affiliation":[{"name":"Zoom Video Communications, New York, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5109-1641","authenticated-orcid":false,"given":"Antonio","family":"Marcedone","sequence":"additional","affiliation":[{"name":"Zoom Video Communications, New York, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,11,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n. d.]. IETF Key Transparency (keytrans). https:\/\/datatracker.ietf.org\/wg\/ keytrans\/about\/. Accessed: 2023-04--27."},{"volume-title":"Advances in Cryptology - ASIACRYPT 2020 (Lecture Notes in Computer Science)","author":"Agrawal Shashank","key":"e_1_3_2_1_2_1","unstructured":"Shashank Agrawal and Srinivasan Raghuraman. 2020. KVaC: Key-Value Commitments for Blockchains and Beyond. In Advances in Cryptology - ASIACRYPT 2020 (Lecture Notes in Computer Science), Shiho Moriai and Huaxiong Wang (Eds.). Springer."},{"key":"e_1_3_2_1_3_1","unstructured":"Apple.com. [n. d.]. Apple Privacy. https:\/\/www.apple.com\/privacy\/features. Accessed: 2022-08-03."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2004.71"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660298"},{"key":"e_1_3_2_1_6_1","volume-title":"Jack O'Connor, Surya Rien, Miles Steele, Matthew Green, Lea Kissner, and Alex Stamos.","author":"Blum Josh","year":"2022","unstructured":"Josh Blum, Simon Booth, Brian Chen, Oded Gal, Maxwell Krohn, Julia Len, Karan Lyons, Antonio Marcedone, Mike Maxim, Merry Ember Mou, Jack O'Connor, Surya Rien, Miles Steele, Matthew Green, Lea Kissner, and Alex Stamos. 2022. E2E Encryption for Zoom Meetings. White Paper -- Github Repository zoom\/zoome2e-whitepaper, Version 3.2, https:\/\/github.com\/zoom\/zoom-e2e-whitepaper\/ blob\/master\/zoom_e2e.pdf."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363202"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-22969-5_19"},{"key":"e_1_3_2_1_9_1","volume-title":"An Empirical Study of Textual Key-Fingerprint Representations. In 25th USENIX Security Symposium, USENIX Security","author":"Dechand Sergej","year":"2016","unstructured":"Sergej Dechand, Dominik Sch\u00fcrmann, Karoline Busse, Yasemin Acar, Sascha Fahl, and Matthew Smith. 2016. An Empirical Study of Textual Key-Fingerprint Representations. In 25th USENIX Security Symposium, USENIX Security 2016. USENIX Association."},{"key":"e_1_3_2_1_10_1","unstructured":"Google. [n. d.]. Key Transparency Overview. https:\/\/github.com\/google\/ keytransparency\/blob\/master\/docs\/overview.md. Accessed: 2022--10-06."},{"volume-title":"2021 IEEE Symposium on Security and Privacy (SP), 285--303","author":"Hu Yuncong","key":"e_1_3_2_1_11_1","unstructured":"Yuncong Hu, Kian Hooshmand, Harika Kalidhindi, Seung Jin Yang, and Raluca A. Popa. 2021. Merkle2: A Low-Latency Transparency Log System. 2021 IEEE Symposium on Security and Privacy (SP), 285--303."},{"key":"e_1_3_2_1_12_1","unstructured":"Keybase.io. [n. d.]. Keybase Chat. https:\/\/book.keybase.io\/docs\/chat. Accessed: 2022-08-03."},{"volume-title":"Meet your sigchain (and everyone else's). https: \/\/book.keybase.io\/docs\/server#meet-your-sigchain-and-everyone-elses. Accessed: 2022-07--29","year":"2014","key":"e_1_3_2_1_13_1","unstructured":"Keybase.io. 2014. Meet your sigchain (and everyone else's). https: \/\/book.keybase.io\/docs\/server#meet-your-sigchain-and-everyone-elses. Accessed: 2022-07--29."},{"key":"e_1_3_2_1_14_1","unstructured":"Keybase.io. 2019. Keybase is not softer than TOFU. https:\/\/keybase.io\/blog\/chatapps-softer-than-tofu. Accessed: 2019-05-05."},{"volume-title":"22nd International World Wide Web Conference, WWW '13. International World Wide Web Conferences Steering Committee \/ ACM.","author":"Hyun-Jin Kim Tiffany","key":"e_1_3_2_1_15_1","unstructured":"Tiffany Hyun-Jin Kim, Lin-Shung Huang, Adrian Perrig, Collin Jackson, and Virgil D. Gligor. 2013. Accountable key infrastructure (AKI): a proposal for a public-key validation infrastructure. In 22nd International World Wide Web Conference, WWW '13. International World Wide Web Conferences Steering Committee \/ ACM."},{"key":"e_1_3_2_1_16_1","unstructured":"Sean Lawlor and Kevin Lewi. 2023. Deploying key transparency at WhatsApp. https:\/\/engineering.fb.com\/2023\/04\/13\/security\/whatsapp-keytransparency\/. Accessed: 2023-04--27."},{"key":"e_1_3_2_1_17_1","volume-title":"31st USENIX Security Symposium, USENIX Security","author":"Leung Derek","year":"2022","unstructured":"Derek Leung, Yossi Gilad, Sergey Gorbunov, Leonid Reyzin, and Nickolai Zeldovich. 2022. Aardvark: An Asynchronous Authenticated Dictionary with Applications to Account-based Cryptocurrencies. In 31st USENIX Security Symposium, USENIX Security 2022. USENIX Association."},{"key":"e_1_3_2_1_18_1","volume-title":"Parakeet: Practical Key Transparency for End-to-End Encrypted Messaging. In 30th Annual Network and Distributed System Security Symposium, NDSS 2023","author":"Malvai Harjasleen","year":"2023","unstructured":"Harjasleen Malvai, Lefteris Kokoris-Kogias, Alberto Sonnino, Esha Ghosh, Ercan Ozt\u00fcrk, Kevin Lewi, and Sean F. Lawlor. 2023. Parakeet: Practical Key Transparency for End-to-End Encrypted Messaging. In 30th Annual Network and Distributed System Security Symposium, NDSS 2023, San Diego, California, USA, February 27 - March 3, 2023. The Internet Society. https:\/\/www.ndss-symposium.org\/ndss-paper\/parakeet-practical-keytransparency-for-end-to-end-encrypted-messaging\/"},{"key":"e_1_3_2_1_19_1","volume-title":"24th USENIX Security Symposium, USENIX Security","author":"Melara Marcela S.","year":"2015","unstructured":"Marcela S. Melara, Aaron Blankstein, Joseph Bonneau, Edward W. Felten, and Michael J. Freedman. 2015. CONIKS: Bringing Key Transparency to End Users. In 24th USENIX Security Symposium, USENIX Security 2015. USENIX Association, Washington, D.C., 383--398. https:\/\/www.usenix.org\/conference\/ usenixsecurity15\/technical-sessions\/presentation\/melara"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/795665.796482"},{"key":"e_1_3_2_1_21_1","unstructured":"microsoft.com. 2022. Teams End-to-End Encryption. https:\/\/docs.microsoft.com\/ en-us\/microsoftteams\/teams-end-to-end-encryption. Accessed: 2022-05--26."},{"key":"e_1_3_2_1_22_1","unstructured":"Signal. [n. d.]. What do I do if my phone is lost or stolen? https: \/\/support.signal.org\/hc\/en-us\/articles\/360007062452-What-do-I-do-if-myphone-is-lost-or-stolen-. Accessed: 2023-02--13."},{"key":"e_1_3_2_1_23_1","unstructured":"signal.org. 2016. Technical information. https:\/\/www.signal.org\/docs. Accessed: 2022-08-03."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3345652"},{"key":"e_1_3_2_1_25_1","unstructured":"Alin Tomescu Yu Xia and Zachary Newman. 2020. Authenticated Dictionaries with Cross-Incremental Proof (Dis)aggregation. Cryptology ePrint Archive Paper 2020\/1239. https:\/\/eprint.iacr.org\/2020\/123. https:\/\/eprint.iacr.org\/2020\/123"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560605"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.23143"},{"key":"e_1_3_2_1_28_1","unstructured":"Webex.com. 2022. Webex End-to-End Encryption. https:\/\/help.webex.com\/enus\/article\/WBX44739\/What-Does-End-to-End-Encryption-Do?. Accessed: 2022- 05--26."},{"key":"e_1_3_2_1_29_1","unstructured":"Whatsapp.com. 2021. WhatsApp Encryption Overview. White Paper -- https: \/\/www.whatsapp.com\/security\/WhatsApp-Security-Whitepaper.pdf. Accessed: 2022-08-03."}],"event":{"name":"CCS '23: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Copenhagen Denmark","acronym":"CCS '23"},"container-title":["Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3576915.3623161","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3576915.3623161","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,13]],"date-time":"2024-12-13T18:18:51Z","timestamp":1734113931000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3576915.3623161"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,15]]},"references-count":29,"alternative-id":["10.1145\/3576915.3623161","10.1145\/3576915"],"URL":"https:\/\/doi.org\/10.1145\/3576915.3623161","relation":{},"subject":[],"published":{"date-parts":[[2023,11,15]]},"assertion":[{"value":"2023-11-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}