{"id":"https://openalex.org/W4405182822","doi":"https://doi.org/10.1145/3658644.3670289","title":"Arke: Scalable and Byzantine Fault Tolerant Privacy-Preserving Contact Discovery","display_name":"Arke: Scalable and Byzantine Fault Tolerant Privacy-Preserving Contact Discovery","publication_year":2024,"publication_date":"2024-12-02","ids":{"openalex":"https://openalex.org/W4405182822","doi":"https://doi.org/10.1145/3658644.3670289"},"language":"en","primary_location":{"id":"doi:10.1145/3658644.3670289","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3670289","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3670289","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3670289","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5115061092","display_name":"Nicolas Mohnblatt","orcid":"https://orcid.org/0009-0004-0472-1697"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Nicolas Mohnblatt","raw_affiliation_strings":["Geometry Research, Netanya, Israel"],"affiliations":[{"raw_affiliation_string":"Geometry Research, Netanya, Israel","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006920985","display_name":"Alberto Sonnino","orcid":"https://orcid.org/0000-0001-5337-4741"},"institutions":[{"id":"https://openalex.org/I45129253","display_name":"University College London","ror":"https://ror.org/02jx3x895","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I45129253"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Alberto Sonnino","raw_affiliation_strings":["Mysten Labs &amp; University College London, London, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Mysten Labs &amp; University College London, London, United Kingdom","institution_ids":["https://openalex.org/I45129253"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075495677","display_name":"Kobi Gurkan","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kobi Gurkan","raw_affiliation_strings":["Geometry Research, Netanya, Israel"],"affiliations":[{"raw_affiliation_string":"Geometry Research, Netanya, Israel","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036662107","display_name":"Philipp Jovanovic","orcid":"https://orcid.org/0000-0002-2202-1879"},"institutions":[{"id":"https://openalex.org/I45129253","display_name":"University College London","ror":"https://ror.org/02jx3x895","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I45129253"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Philipp Jovanovic","raw_affiliation_strings":["University College London, London, United Kingdom"],"affiliations":[{"raw_affiliation_string":"University College London, London, United Kingdom","institution_ids":["https://openalex.org/I45129253"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5115061092"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.6879,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.77197554,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"3212","last_page":"3226"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11704","display_name":"Mobile Crowdsensing and Crowdsourcing","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.856214165687561},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.824462354183197},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4366473853588104},{"id":"https://openalex.org/keywords/latency","display_name":"Latency (audio)","score":0.4184314012527466},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.40668433904647827},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3820376396179199},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.13841047883033752}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.856214165687561},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.824462354183197},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4366473853588104},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.4184314012527466},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.40668433904647827},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3820376396179199},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.13841047883033752},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3658644.3670289","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3670289","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3670289","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},{"id":"pmh:oai:eprints.ucl.ac.uk.OAI2:10204912","is_oa":true,"landing_page_url":"https://discovery.ucl.ac.uk/id/eprint/10204912/","pdf_url":"https://discovery.ucl.ac.uk/10204912/1/arke.pdf","source":{"id":"https://openalex.org/S4306400024","display_name":"UCL Discovery (University College London)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I45129253","host_organization_name":"University College London","host_organization_lineage":["https://openalex.org/I45129253"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"In:  Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security.  (pp. pp. 3212-3226).  ACM (Association for Computing Machinery): Salt Lake City, UT, USA. (2024)","raw_type":"Proceedings paper"}],"best_oa_location":{"id":"doi:10.1145/3658644.3670289","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3670289","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3670289","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.6499999761581421,"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4405182822.pdf","grobid_xml":"https://content.openalex.org/works/W4405182822.grobid-xml"},"referenced_works_count":21,"referenced_works":["https://openalex.org/W1610688607","https://openalex.org/W1794148987","https://openalex.org/W2091767251","https://openalex.org/W2113929724","https://openalex.org/W2114579022","https://openalex.org/W2133420971","https://openalex.org/W2148634356","https://openalex.org/W2152924492","https://openalex.org/W2169965215","https://openalex.org/W2496543269","https://openalex.org/W2535199873","https://openalex.org/W2767079258","https://openalex.org/W3091347766","https://openalex.org/W3151272651","https://openalex.org/W3176502901","https://openalex.org/W4213382482","https://openalex.org/W4220853208","https://openalex.org/W4245829644","https://openalex.org/W4248175462","https://openalex.org/W4323304023","https://openalex.org/W6910491451"],"related_works":["https://openalex.org/W2389214306","https://openalex.org/W2965083567","https://openalex.org/W2393741509","https://openalex.org/W1982914007","https://openalex.org/W2159583675","https://openalex.org/W1824242903","https://openalex.org/W1493858311","https://openalex.org/W2155470929","https://openalex.org/W2111125783","https://openalex.org/W2394465510"],"abstract_inverted_index":{"Contact":[0],"discovery":[1,21,66,162],"is":[2,62,70],"a":[3,18,85,109,135,145,153],"crucial":[4],"component":[5],"of":[6,27,32,45,56,72,76,101,117,137,147,165],"social":[7],"applications,":[8],"facilitating":[9],"interactions":[10],"between":[11],"registered":[12],"contacts.":[13],"This":[14],"work":[15],"introduces":[16],"Arke,":[17],"novel":[19],"contact":[20,65,161],"scheme":[22],"that":[23,81,132],"addresses":[24],"the":[25,43,63,73,79,115,166],"limitations":[26],"existing":[28],"solutions":[29],"in":[30,84,125,152,170],"terms":[31],"privacy,":[33],"scalability,":[34],"and":[35,51,78],"reliance":[36],"on":[37,99],"trusted":[38],"third":[39],"parties.":[40],"Arke":[41,61,113,133],"ensures":[42],"unlinkability":[44],"user":[46,140],"interactions,":[47],"mitigates":[48],"enumeration":[49],"attacks,":[50],"operates":[52],"without":[53],"single":[54],"points":[55],"failure":[57],"or":[58],"trust.":[59],"Notably,":[60],"first":[64,80],"system":[67],"whose":[68],"performance":[69],"independent":[71],"total":[74],"number":[75],"users":[77],"can":[82],"operate":[83],"Byzantine":[86],"setting.":[87],"It":[88],"achieves":[89],"its":[90],"privacy":[91],"goals":[92],"through":[93],"an":[94,102,126],"unlinkable":[95],"handshake":[96],"mechanism":[97],"built":[98],"top":[100],"identity-based":[103],"non-interactive":[104],"key":[105],"exchange.":[106],"By":[107],"leveraging":[108],"custom":[110],"distributed":[111],"architecture,":[112],"forgoes":[114],"expense":[116],"consensus":[118],"to":[119],"achieve":[120],"scalability":[121],"while":[122],"maintaining":[123],"consistency":[124],"adversarial":[127],"environment.":[128],"Performance":[129],"evaluations":[130],"demonstrate":[131],"provides":[134],"throughput":[136],"over":[138],"1,500":[139],"requests":[141],"per":[142],"second":[143],"at":[144],"latency":[146],"less":[148],"than":[149],"0.5":[150],"seconds":[151],"large":[154],"geo-distributed":[155],"setting":[156],"which":[157],"would":[158],"allow":[159],"privacy-preserving":[160],"for":[163],"all":[164],"popular":[167],"messaging":[168],"applications":[169],"one":[171],"system.":[172]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
