{"id":"https://openalex.org/W4416649959","doi":"https://doi.org/10.1109/jsac.2025.3637020","title":"A Provably Secure Network Protocol for Private Communication With Analysis and Tracing Resistance","display_name":"A Provably Secure Network Protocol for Private Communication With Analysis and Tracing Resistance","publication_year":2025,"publication_date":"2025-11-25","ids":{"openalex":"https://openalex.org/W4416649959","doi":"https://doi.org/10.1109/jsac.2025.3637020"},"language":null,"primary_location":{"id":"doi:10.1109/jsac.2025.3637020","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsac.2025.3637020","pdf_url":null,"source":{"id":"https://openalex.org/S90422530","display_name":"IEEE Journal on Selected Areas in Communications","issn_l":"0733-8716","issn":["0733-8716","1558-0008"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Journal on Selected Areas in Communications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020487021","display_name":"Chao Ge","orcid":"https://orcid.org/0000-0002-5035-5809"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chao Ge","raw_affiliation_strings":["Department of Electronic Engineering, BNRist, Tsinghua University, Beijing, China","Department of Electronic Engineering, Tsinghua University, China"],"affiliations":[{"raw_affiliation_string":"Department of Electronic Engineering, BNRist, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Department of Electronic Engineering, Tsinghua University, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Wei Yuan","orcid":"https://orcid.org/0000-0002-6347-8357"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210120485","display_name":"Academy of Mathematics and Systems Science","ror":"https://ror.org/02jkmyk67","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210120485"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Yuan","raw_affiliation_strings":["Chinese Academy of Sciences, State Key Laboratory of Mathematical Sciences, Academy of Mathematics and Systems Science, Beijing, China","Academy of Mathematics and Systems Science, State Key Laboratory of Mathematical Sciences, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences, State Key Laboratory of Mathematical Sciences, Academy of Mathematics and Systems Science, Beijing, China","institution_ids":["https://openalex.org/I4210120485"]},{"raw_affiliation_string":"Academy of Mathematics and Systems Science, State Key Laboratory of Mathematical Sciences, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210120485","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100359782","display_name":"Ge Chen","orcid":"https://orcid.org/0000-0003-4308-1341"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210120485","display_name":"Academy of Mathematics and Systems Science","ror":"https://ror.org/02jkmyk67","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210120485"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ge Chen","raw_affiliation_strings":["Chinese Academy of Sciences, State Key Laboratory of Mathematical Sciences, Academy of Mathematics and Systems Science, Beijing, China","Academy of Mathematics and Systems Science, State Key Laboratory of Mathematical Sciences, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences, State Key Laboratory of Mathematical Sciences, Academy of Mathematics and Systems Science, Beijing, China","institution_ids":["https://openalex.org/I4210120485"]},{"raw_affiliation_string":"Academy of Mathematics and Systems Science, State Key Laboratory of Mathematical Sciences, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210120485","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056715913","display_name":"Yanbin Pan","orcid":"https://orcid.org/0000-0002-5591-0234"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210120485","display_name":"Academy of Mathematics and Systems Science","ror":"https://ror.org/02jkmyk67","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210120485"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yanbin Pan","raw_affiliation_strings":["Chinese Academy of Sciences, State Key Laboratory of Mathematical Sciences, Academy of Mathematics and Systems Science, Beijing, China","Academy of Mathematics and Systems Science, State Key Laboratory of Mathematical Sciences, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences, State Key Laboratory of Mathematical Sciences, Academy of Mathematics and Systems Science, Beijing, China","institution_ids":["https://openalex.org/I4210120485"]},{"raw_affiliation_string":"Academy of Mathematics and Systems Science, State Key Laboratory of Mathematical Sciences, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210120485","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052022779","display_name":"Yuan Shen","orcid":"https://orcid.org/0000-0002-9396-1964"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuan Shen","raw_affiliation_strings":["Department of Electronic Engineering, BNRist, Tsinghua University, Beijing, China","Department of Electronic Engineering, Tsinghua University, China"],"affiliations":[{"raw_affiliation_string":"Department of Electronic Engineering, BNRist, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Department of Electronic Engineering, Tsinghua University, China","institution_ids":["https://openalex.org/I99065089"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5020487021"],"corresponding_institution_ids":["https://openalex.org/I99065089"],"apc_list":null,"apc_paid":null,"fwci":2.3568,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.91937114,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"44","issue":null,"first_page":"2173","last_page":"2185"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9793000221252441,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9793000221252441,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.005100000184029341,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.0019000000320374966,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5045999884605408},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4943000078201294},{"id":"https://openalex.org/keywords/communication-source","display_name":"Communication source","score":0.42399999499320984},{"id":"https://openalex.org/keywords/communications-protocol","display_name":"Communications protocol","score":0.4237000048160553},{"id":"https://openalex.org/keywords/secure-communication","display_name":"Secure communication","score":0.41589999198913574},{"id":"https://openalex.org/keywords/heuristic","display_name":"Heuristic","score":0.37400001287460327},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3734999895095825},{"id":"https://openalex.org/keywords/universal-composability","display_name":"Universal composability","score":0.3659000098705292},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.3652999997138977},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.36160001158714294}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8752999901771545},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5961999893188477},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5480999946594238},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5045999884605408},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4943000078201294},{"id":"https://openalex.org/C198104137","wikidata":"https://www.wikidata.org/wiki/Q974688","display_name":"Communication source","level":2,"score":0.42399999499320984},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.4237000048160553},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.41589999198913574},{"id":"https://openalex.org/C173801870","wikidata":"https://www.wikidata.org/wiki/Q201413","display_name":"Heuristic","level":2,"score":0.37400001287460327},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3734999895095825},{"id":"https://openalex.org/C165751822","wikidata":"https://www.wikidata.org/wiki/Q7894118","display_name":"Universal composability","level":4,"score":0.3659000098705292},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.3652999997138977},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.36160001158714294},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.35910001397132874},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.3418999910354614},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.34119999408721924},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.33869999647140503},{"id":"https://openalex.org/C153876917","wikidata":"https://www.wikidata.org/wiki/Q899704","display_name":"Traceability","level":2,"score":0.3384000062942505},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.33340001106262207},{"id":"https://openalex.org/C138673069","wikidata":"https://www.wikidata.org/wiki/Q322229","display_name":"Tracing","level":2,"score":0.32030001282691956},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.3190999925136566},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.31869998574256897},{"id":"https://openalex.org/C192126672","wikidata":"https://www.wikidata.org/wiki/Q1068715","display_name":"Telecommunications network","level":2,"score":0.31610000133514404},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.3077000081539154},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.30329999327659607},{"id":"https://openalex.org/C168535184","wikidata":"https://www.wikidata.org/wiki/Q93312","display_name":"OSI model","level":3,"score":0.2921000123023987},{"id":"https://openalex.org/C103613024","wikidata":"https://www.wikidata.org/wiki/Q230924","display_name":"Stateless protocol","level":3,"score":0.29190000891685486},{"id":"https://openalex.org/C139089976","wikidata":"https://www.wikidata.org/wiki/Q2142273","display_name":"Trusted third party","level":2,"score":0.2797999978065491},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.2777000069618225},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2745000123977661},{"id":"https://openalex.org/C2779813694","wikidata":"https://www.wikidata.org/wiki/Q528053","display_name":"Digital identity","level":3,"score":0.2705000042915344},{"id":"https://openalex.org/C158156997","wikidata":"https://www.wikidata.org/wiki/Q1416645","display_name":"Models of communication","level":2,"score":0.26499998569488525},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.26249998807907104},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.25859999656677246},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.25679999589920044},{"id":"https://openalex.org/C189693848","wikidata":"https://www.wikidata.org/wiki/Q6031064","display_name":"Information exchange","level":2,"score":0.2533999979496002},{"id":"https://openalex.org/C117387248","wikidata":"https://www.wikidata.org/wiki/Q11186","display_name":"Private network","level":2,"score":0.2513999938964844}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jsac.2025.3637020","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsac.2025.3637020","pdf_url":null,"source":{"id":"https://openalex.org/S90422530","display_name":"IEEE Journal on Selected Areas in Communications","issn_l":"0733-8716","issn":["0733-8716","1558-0008"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Journal on Selected Areas in Communications","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1493729696","display_name":null,"funder_award_id":"12071465","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2671578558","display_name":null,"funder_award_id":"2022YFA1004600","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G4422235565","display_name":null,"funder_award_id":"62271285","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8533620077","display_name":null,"funder_award_id":"12288201","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8680455289","display_name":null,"funder_award_id":"62525112","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":45,"referenced_works":["https://openalex.org/W1479826276","https://openalex.org/W1585766570","https://openalex.org/W1590015132","https://openalex.org/W1590460391","https://openalex.org/W1595797875","https://openalex.org/W1601001795","https://openalex.org/W1606058619","https://openalex.org/W1655958391","https://openalex.org/W1855109561","https://openalex.org/W1880384800","https://openalex.org/W1995885288","https://openalex.org/W2031925412","https://openalex.org/W2042301701","https://openalex.org/W2084330204","https://openalex.org/W2103647628","https://openalex.org/W2108668142","https://openalex.org/W2111586182","https://openalex.org/W2117362057","https://openalex.org/W2131559681","https://openalex.org/W2132238781","https://openalex.org/W2141395382","https://openalex.org/W2156186849","https://openalex.org/W2164684796","https://openalex.org/W2166094320","https://openalex.org/W2502516856","https://openalex.org/W2512940382","https://openalex.org/W2513854448","https://openalex.org/W2767079719","https://openalex.org/W2888372991","https://openalex.org/W2891940245","https://openalex.org/W2946759674","https://openalex.org/W2969916225","https://openalex.org/W3009707090","https://openalex.org/W3046597429","https://openalex.org/W3127165609","https://openalex.org/W3157405212","https://openalex.org/W3185634836","https://openalex.org/W3195333310","https://openalex.org/W4282018642","https://openalex.org/W4294811933","https://openalex.org/W4362500847","https://openalex.org/W4381786205","https://openalex.org/W4387857486","https://openalex.org/W4402633818","https://openalex.org/W4416649959"],"related_works":[],"abstract_inverted_index":{"Anonymous":[0],"communication":[1,10,141],"networks":[2],"have":[3],"emerged":[4],"as":[5],"crucial":[6],"tools":[7],"for":[8,102,139],"obfuscating":[9],"pathways":[11],"and":[12,36,60,69,76,120],"concealing":[13],"user":[14,129],"identities.":[15],"However,":[16],"their":[17],"practical":[18,115],"deployment":[19],"faces":[20],"several":[21],"critical":[22],"challenges,":[23],"including":[24],"vulnerability":[25],"to":[26],"artificial":[27],"intelligence-powered":[28],"metadata":[29],"analysis,":[30],"difficulties":[31],"in":[32,105,142],"fitting":[33],"decentralized":[34,52,68],"architectures,":[35],"the":[37,73,113,131],"lack":[38],"of":[39,92],"provable":[40],"security":[41,90,119],"guarantees.":[42],"To":[43],"address":[44],"these":[45],"limitations,":[46],"this":[47,95],"paper":[48,96],"proposes":[49],"a":[50,135],"novel":[51],"anonymous":[53,93],"routing":[54],"protocol":[55,65,133],"that":[56],"resists":[57],"both":[58,118],"traceability":[59],"traffic":[61],"analysis.":[62],"The":[63],"proposed":[64,132],"is":[66],"fully":[67],"eliminates":[70],"reliance":[71],"on":[72],"threshold":[74],"model":[75],"trusted":[77],"third-party":[78],"setups,":[79],"ensuring":[80],"indistinguishable":[81,99],"identity":[82,100],"privacy.":[83],"Different":[84],"from":[85],"traditional":[86],"empirical":[87],"or":[88],"heuristic":[89],"analysis":[91],"networks,":[94],"rigorously":[97],"proves":[98],"privacy":[101],"users":[103],"even":[104],"extremely":[106],"adversarial":[107],"environments.":[108],"Furthermore,":[109],"simulation":[110],"results":[111],"validate":[112],"protocol\u2019s":[114],"feasibility,":[116],"demonstrating":[117],"efficiency.":[121],"By":[122],"enabling":[123],"secure":[124,137],"information":[125],"exchange":[126],"while":[127],"preserving":[128],"privacy,":[130],"offers":[134],"provably":[136],"solution":[138],"privacy-preserving":[140],"modern":[143],"digital":[144],"infrastructures.":[145]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-11-25T00:00:00"}
