{"id":"https://openalex.org/W7131280467","doi":"https://doi.org/10.1109/acsac67867.2025.00088","title":"End-to-End Encrypted Applications with Strong Consistency Under Byzantine Actors","display_name":"End-to-End Encrypted Applications with Strong Consistency Under Byzantine Actors","publication_year":2025,"publication_date":"2025-12-08","ids":{"openalex":"https://openalex.org/W7131280467","doi":"https://doi.org/10.1109/acsac67867.2025.00088"},"language":null,"primary_location":{"id":"doi:10.1109/acsac67867.2025.00088","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acsac67867.2025.00088","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE Annual Computer Security Applications Conference (ACSAC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5015182353","display_name":"Natalie Popescu","orcid":null},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Natalie Popescu","raw_affiliation_strings":["Princeton University,Princeton,New Jersey,USA"],"affiliations":[{"raw_affiliation_string":"Princeton University,Princeton,New Jersey,USA","institution_ids":["https://openalex.org/I20089843"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040395896","display_name":"Shai Caspin","orcid":"https://orcid.org/0000-0003-4591-1767"},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shai Caspin","raw_affiliation_strings":["Princeton University,Princeton,New Jersey,USA"],"affiliations":[{"raw_affiliation_string":"Princeton University,Princeton,New Jersey,USA","institution_ids":["https://openalex.org/I20089843"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5093098692","display_name":"Leon Schuermann","orcid":"https://orcid.org/0000-0002-1429-7808"},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Leon Schuermann","raw_affiliation_strings":["Princeton University,Princeton,New Jersey,USA"],"affiliations":[{"raw_affiliation_string":"Princeton University,Princeton,New Jersey,USA","institution_ids":["https://openalex.org/I20089843"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008114041","display_name":"Jie Chen","orcid":"https://orcid.org/0000-0002-9254-4413"},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jingyuan Chen","raw_affiliation_strings":["Princeton University,Princeton,New Jersey,USA"],"affiliations":[{"raw_affiliation_string":"Princeton University,Princeton,New Jersey,USA","institution_ids":["https://openalex.org/I20089843"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5123635640","display_name":"Amit Levy","orcid":null},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Amit Levy","raw_affiliation_strings":["Princeton University,Princeton,New Jersey,USA"],"affiliations":[{"raw_affiliation_string":"Princeton University,Princeton,New Jersey,USA","institution_ids":["https://openalex.org/I20089843"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5015182353"],"corresponding_institution_ids":["https://openalex.org/I20089843"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.88670975,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1097","last_page":"1110"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.8144000172615051,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.8144000172615051,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.06350000202655792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.052299998700618744,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/consistency","display_name":"Consistency (knowledge bases)","score":0.7721999883651733},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6177999973297119},{"id":"https://openalex.org/keywords/byzantine-architecture","display_name":"Byzantine architecture","score":0.5909000039100647},{"id":"https://openalex.org/keywords/byzantine-fault-tolerance","display_name":"Byzantine fault tolerance","score":0.5874000191688538},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5419999957084656},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5209000110626221},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.5029000043869019},{"id":"https://openalex.org/keywords/java","display_name":"Java","score":0.45410001277923584}],"concepts":[{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.7721999883651733},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.694599986076355},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6177999973297119},{"id":"https://openalex.org/C104562893","wikidata":"https://www.wikidata.org/wiki/Q47591","display_name":"Byzantine architecture","level":2,"score":0.5909000039100647},{"id":"https://openalex.org/C168021876","wikidata":"https://www.wikidata.org/wiki/Q1353446","display_name":"Byzantine fault tolerance","level":3,"score":0.5874000191688538},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5419999957084656},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5209000110626221},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.5029000043869019},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46860000491142273},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.45410001277923584},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.43950000405311584},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.3402000069618225},{"id":"https://openalex.org/C3018648624","wikidata":"https://www.wikidata.org/wiki/Q1096878","display_name":"Scuba diving","level":2,"score":0.33719998598098755},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.3278999924659729},{"id":"https://openalex.org/C122377713","wikidata":"https://www.wikidata.org/wiki/Q4422799","display_name":"Weak consistency","level":4,"score":0.323199987411499},{"id":"https://openalex.org/C172086080","wikidata":"https://www.wikidata.org/wiki/Q62270","display_name":"Remote procedure call","level":2,"score":0.31349998712539673},{"id":"https://openalex.org/C31388003","wikidata":"https://www.wikidata.org/wiki/Q7624548","display_name":"Strong consistency","level":3,"score":0.30889999866485596},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.30169999599456787},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.30070000886917114},{"id":"https://openalex.org/C152880691","wikidata":"https://www.wikidata.org/wiki/Q146813","display_name":"Client\u2013server model","level":3,"score":0.290800005197525},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.27639999985694885},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.2727000117301941},{"id":"https://openalex.org/C34422012","wikidata":"https://www.wikidata.org/wiki/Q6125872","display_name":"Eventual consistency","level":4,"score":0.26759999990463257},{"id":"https://openalex.org/C174839445","wikidata":"https://www.wikidata.org/wiki/Q1134386","display_name":"Lock (firearm)","level":2,"score":0.26330000162124634}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/acsac67867.2025.00088","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acsac67867.2025.00088","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE Annual Computer Security Applications Conference (ACSAC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1544435806","https://openalex.org/W1985349143","https://openalex.org/W1992157848","https://openalex.org/W2029693536","https://openalex.org/W2114349788","https://openalex.org/W2117260615","https://openalex.org/W2118179522","https://openalex.org/W2159915142","https://openalex.org/W2625599531","https://openalex.org/W2763748542","https://openalex.org/W2803071459","https://openalex.org/W2895635470","https://openalex.org/W2944922632","https://openalex.org/W2987197578","https://openalex.org/W3082298816","https://openalex.org/W3139430581","https://openalex.org/W4286255341","https://openalex.org/W4385654014"],"related_works":[],"abstract_inverted_index":{"Existing":[0],"end-to-end":[1,43,140],"encrypted":[2,44],"systems":[3],"provide":[4],"applications":[5,21,48,68,109,128,136],"with":[6],"strong":[7,23,60],"privacy":[8],"and":[9,63,75,94,117,124],"integrity":[10],"guarantees,":[11],"but":[12],"fully":[13],"trust":[14],"the":[15,56,72,88,113],"server":[16,30,99],"for":[17,46],"consistency.":[18],"However,":[19],"many":[20,127],"consider":[22],"consistency":[24,77,85],"a":[25,28,50,91,98,102],"security":[26],"property:":[27],"Byzantine":[29,51,92],"can":[31,125],"corrupt":[32],"application":[33],"state":[34],"by":[35],"manipulating":[36],"operation":[37],"orders.":[38],"We":[39,105],"present":[40],"SCUBA,":[41],"an":[42],"framework":[45],"strongly-consistent":[47],"in":[49,87],"setting.":[52],"At":[53],"its":[54],"core,":[55],"SCUBA":[57,82,114,120,131],"protocol":[58],"establishes":[59],"privacy,":[61],"integrity,":[62],"ordering":[64],"guarantees":[65,86],"that":[66,119],"let":[67],"achieve":[69],"up":[70],"to":[71,80,101,137],"strongest":[73],"single-":[74],"multi-key":[76],"models":[78],"known":[79],"date.":[81],"upholds":[83],"all":[84],"face":[89],"of":[90,112,135],"server,":[93],"lets":[95],"clients":[96],"prove":[97],"misbehaved":[100],"third":[103],"party.":[104],"build":[106],"four":[107],"previously-unsupported":[108],"on":[110],"top":[111],"key-value":[115],"store,":[116],"show":[118],"imposes":[121],"minimal":[122],"overheads":[123],"support":[126],"at":[129],"once.":[130],"enables":[132],"entire":[133],"classes":[134],"benefit":[138],"from":[139],"encryption.":[141]},"counts_by_year":[],"updated_date":"2026-02-25T21:11:00.739837","created_date":"2026-02-25T00:00:00"}
