{"id":"https://openalex.org/W3160052331","doi":"https://doi.org/10.1145/3447654.3447671","title":"Pixy: A Privacy-Increasing Group Creation Scheme","display_name":"Pixy: A Privacy-Increasing Group Creation Scheme","publication_year":2020,"publication_date":"2020-12-18","ids":{"openalex":"https://openalex.org/W3160052331","doi":"https://doi.org/10.1145/3447654.3447671","mag":"3160052331"},"language":"en","primary_location":{"id":"doi:10.1145/3447654.3447671","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3447654.3447671","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 The 9th International Conference on Networks, Communication and Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027418568","display_name":"David M\u00f6dinger","orcid":"https://orcid.org/0000-0002-5917-2419"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"David M\u00f6dinger","raw_affiliation_strings":["Ulm University, Germany"],"affiliations":[{"raw_affiliation_string":"Ulm University, Germany","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061837301","display_name":"Nicola Fr\u00f6hlich","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Nicola Fr\u00f6hlich","raw_affiliation_strings":["Ulm University, Germany"],"affiliations":[{"raw_affiliation_string":"Ulm University, Germany","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5063859087","display_name":"Franz J. Hauck","orcid":"https://orcid.org/0000-0002-7480-9617"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Franz J. Hauck","raw_affiliation_strings":["Ulm University, Germany"],"affiliations":[{"raw_affiliation_string":"Ulm University, Germany","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5027418568"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.1515,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.48736011,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"118","last_page":"124"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7466329336166382},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5971707105636597},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5734665989875793},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5357908606529236},{"id":"https://openalex.org/keywords/sort","display_name":"sort","score":0.49793553352355957},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4380561411380768},{"id":"https://openalex.org/keywords/group","display_name":"Group (periodic table)","score":0.428079754114151},{"id":"https://openalex.org/keywords/group-selection","display_name":"Group selection","score":0.41270214319229126},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.3806409239768982},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3310103416442871},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.11991313099861145},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.098320871591568}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7466329336166382},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5971707105636597},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5734665989875793},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5357908606529236},{"id":"https://openalex.org/C88548561","wikidata":"https://www.wikidata.org/wiki/Q347599","display_name":"sort","level":2,"score":0.49793553352355957},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4380561411380768},{"id":"https://openalex.org/C2781311116","wikidata":"https://www.wikidata.org/wiki/Q83306","display_name":"Group (periodic table)","level":2,"score":0.428079754114151},{"id":"https://openalex.org/C51520907","wikidata":"https://www.wikidata.org/wiki/Q874437","display_name":"Group selection","level":3,"score":0.41270214319229126},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.3806409239768982},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3310103416442871},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.11991313099861145},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.098320871591568},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3447654.3447671","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3447654.3447671","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 The 9th International Conference on Networks, Communication and Computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4300000071525574,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W1603565383","https://openalex.org/W1632088469","https://openalex.org/W1637818300","https://openalex.org/W1681659085","https://openalex.org/W1750831793","https://openalex.org/W1781604065","https://openalex.org/W1805165030","https://openalex.org/W1982185321","https://openalex.org/W1998350371","https://openalex.org/W2039317858","https://openalex.org/W2047493761","https://openalex.org/W2047925852","https://openalex.org/W2072410439","https://openalex.org/W2087811006","https://openalex.org/W2103299932","https://openalex.org/W2119142112","https://openalex.org/W2120761930","https://openalex.org/W2127644875","https://openalex.org/W2141730835","https://openalex.org/W2141870382","https://openalex.org/W2145788053","https://openalex.org/W2150941206","https://openalex.org/W2153305401","https://openalex.org/W2167554088","https://openalex.org/W2294814269","https://openalex.org/W2597047587","https://openalex.org/W2693668331","https://openalex.org/W2791445945","https://openalex.org/W2795301572","https://openalex.org/W2798081771","https://openalex.org/W2884026699","https://openalex.org/W2885172320","https://openalex.org/W2892187214","https://openalex.org/W2896013314","https://openalex.org/W2940541697","https://openalex.org/W3003153370","https://openalex.org/W3027366923","https://openalex.org/W4292918165","https://openalex.org/W6754714939"],"related_works":["https://openalex.org/W2361805396","https://openalex.org/W2972254340","https://openalex.org/W1805912688","https://openalex.org/W2373973507","https://openalex.org/W2022231341","https://openalex.org/W4250902763","https://openalex.org/W4255476312","https://openalex.org/W2351154965","https://openalex.org/W2041503010","https://openalex.org/W2357579988"],"abstract_inverted_index":{"Modern":[0],"peer-to-peer":[1],"networks":[2,11],"provide":[3,28],"a":[4,87,94,111],"lot":[5],"of":[6,47,136],"value.":[7],"However,":[8],"as":[9],"the":[10,44,104,133],"handle":[12],"more":[13,15],"and":[14,99],"sensitive":[16],"data,":[17],"e.g.":[18],"in":[19,138],"cryptocurrencies,":[20],"privacy":[21,30,45,76,137],"becomes":[22],"an":[23,70],"issue.":[24],"Several":[25],"approaches":[26],"to":[27,31,43,74],"efficient":[29],"network":[32],"participants":[33],"rely":[34],"on":[35,57,97,115],"group":[36,78,91,108],"formation":[37,79],"with":[38],"little":[39],"or":[40],"no":[41],"regard":[42],"impact":[46],"how":[48],"groups":[49],"are":[50],"created.":[51],"Group":[52],"creation":[53],"is":[54],"often":[55],"based":[56,96,114],"random":[58],"selection,":[59],"which":[60],"can":[61],"easily":[62],"be":[63],"highjacked":[64],"by":[65],"attackers.":[66,126],"We":[67,127],"propose":[68],"Pixy,":[69],"extensible,":[71],"component-based":[72],"scheme":[73,85,131],"increase":[75],"during":[77],"stages":[80],"beyond":[81],"current":[82,134],"approaches.":[83],"Our":[84],"provides":[86],"two-stage":[88],"setup":[89],"for":[90,107,119],"formation.":[92],"First,":[93],"selection":[95],"personal":[98],"network-wide":[100],"collaboration":[101],"lists":[102],"reduces":[103],"attack":[105],"surface":[106],"initiators.":[109],"Second,":[110],"testing":[112],"phase":[113],"cryptographic":[116],"puzzles":[117],"and,":[118],"suitable":[120],"contexts,":[121],"CAPTCHAs":[122],"sort":[123],"out":[124],"Sybil":[125],"show":[128],"that":[129],"this":[130],"improves":[132],"state":[135],"group-creation":[139],"processes.":[140]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
