{"id":"https://openalex.org/W4411377615","doi":"https://doi.org/10.1145/3733102.3733150","title":"MOCHA: Mixnet Optimization Considering Honest Client Anonymity","display_name":"MOCHA: Mixnet Optimization Considering Honest Client Anonymity","publication_year":2025,"publication_date":"2025-06-17","ids":{"openalex":"https://openalex.org/W4411377615","doi":"https://doi.org/10.1145/3733102.3733150"},"language":"en","primary_location":{"id":"doi:10.1145/3733102.3733150","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3733102.3733150","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3733102.3733150","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM Workshop on Information Hiding and Multimedia Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3733102.3733150","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039370021","display_name":"Mahdi Rahimi","orcid":"https://orcid.org/0009-0003-0223-9082"},"institutions":[{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]}],"countries":["BE"],"is_corresponding":true,"raw_author_name":"Mahdi Rahimi","raw_affiliation_strings":["COSIC (KU Leuven), KU Leuven, Leuven, Belgium"],"raw_orcid":"https://orcid.org/0009-0003-0223-9082","affiliations":[{"raw_affiliation_string":"COSIC (KU Leuven), KU Leuven, Leuven, Belgium","institution_ids":["https://openalex.org/I99464096"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5039370021"],"corresponding_institution_ids":["https://openalex.org/I99464096"],"apc_list":null,"apc_paid":null,"fwci":4.3465,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.94104621,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"98","last_page":"107"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.8662194013595581},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6882544159889221},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4244884252548218},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3656020164489746}],"concepts":[{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.8662194013595581},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6882544159889221},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4244884252548218},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3656020164489746}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3733102.3733150","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3733102.3733150","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3733102.3733150","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM Workshop on Information Hiding and Multimedia Security","raw_type":"proceedings-article"},{"id":"pmh:oai:lirias2repo.kuleuven.be:20.500.12942/764924","is_oa":true,"landing_page_url":"https://lirias.kuleuven.be/handle/20.500.12942/764924","pdf_url":null,"source":{"id":"https://openalex.org/S4306401954","display_name":"Lirias (KU Leuven)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I99464096","host_organization_name":"KU Leuven","host_organization_lineage":["https://openalex.org/I99464096"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"ACM Workshop on Information Hiding and Multimedia Security, San Jose, CA, 18-20 June 2025","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"doi:10.1145/3733102.3733150","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3733102.3733150","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3733102.3733150","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM Workshop on Information Hiding and Multimedia Security","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G6220799212","display_name":null,"funder_award_id":"VOEWICS02","funder_id":"https://openalex.org/F4320327336","funder_display_name":"Vlaamse regering"}],"funders":[{"id":"https://openalex.org/F4320327336","display_name":"Vlaamse regering","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4411377615.pdf","grobid_xml":"https://content.openalex.org/works/W4411377615.grobid-xml"},"referenced_works_count":17,"referenced_works":["https://openalex.org/W1479826276","https://openalex.org/W1484798037","https://openalex.org/W1599111390","https://openalex.org/W2103647628","https://openalex.org/W2108668142","https://openalex.org/W2109394932","https://openalex.org/W2162297215","https://openalex.org/W2163674653","https://openalex.org/W2512940382","https://openalex.org/W2649500836","https://openalex.org/W3209750973","https://openalex.org/W3212917226","https://openalex.org/W4286257255","https://openalex.org/W4391725292","https://openalex.org/W4393927890","https://openalex.org/W4399556682","https://openalex.org/W4409102902"],"related_works":["https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4383746662","https://openalex.org/W2969366455","https://openalex.org/W1555088513","https://openalex.org/W2610828280","https://openalex.org/W1966157179","https://openalex.org/W3129391636","https://openalex.org/W2057119605","https://openalex.org/W1779549899"],"abstract_inverted_index":{"Mix":[0],"networks":[1],"(mixnets)":[2],"safeguard":[3],"client":[4,75,91,108,132,138,160],"anonymity":[5,34,63,82,92,114,139,161],"by":[6,36,162],"forwarding":[7],"traffic":[8,166],"through":[9],"multiple":[10],"intermediary":[11],"nodes":[12],"(mixnodes),":[13],"which":[14],"reorder":[15],"and":[16,107,120],"delay":[17],"messages":[18],"to":[19,80,89,98,144],"obscure":[20],"communication":[21],"patterns":[22],"against":[23],"a":[24,42,46,155],"global":[25],"passive":[26],"adversary":[27],"capable":[28],"of":[29,72,77,131,148],"monitoring":[30],"all":[31],"network":[32],"transmissions.The":[33],"provided":[35],"mixnets":[37],"is":[38,140],"usually":[39],"assessed":[40],"with":[41,168],"discrete-event":[43],"simulator,":[44],"gauging":[45],"target":[47],"message's":[48],"indistinguishability":[49],"among":[50],"output":[51],"messages.While":[52],"useful":[53],"for":[54,93,125],"comparative":[55],"analysis,":[56],"this":[57,65],"approach":[58],"only":[59],"approximates":[60],"the":[61,70,74,129],"mixnet's":[62],"potential.Hence,":[64],"paper":[66],"sheds":[67],"light":[68],"on":[69],"necessity":[71],"considering":[73,104],"(originator":[76],"messages)":[78],"itself":[79],"gauge":[81],"accurately.We":[83],"further":[84],"provide":[85],"an":[86,117,145],"algorithm":[87],"(simulator)":[88],"simulate":[90],"Loopix":[94,101],"mixnets.We":[95],"conduct":[96],"experiments":[97],"optimize":[99],"general":[100],"mixnet":[102,126],"parameters,":[103],"both":[105],"message":[106,113],"anonymity.Our":[109],"findings":[110],"indicate":[111],"that":[112,158],"often":[115],"provides":[116],"upper":[118],"bound":[119],"can":[121],"yield":[122],"misleading":[123],"results":[124],"optimization,":[127],"underscoring":[128],"importance":[130],"anonymity.Additionally,":[133],"we":[134,153],"explore":[135],"scenarios":[136],"where":[137],"significantly":[141],"compromised":[142],"due":[143],"insufficient":[146],"number":[147],"clients.To":[149],"address":[150],"these":[151],"cases,":[152],"propose":[154],"multimixing":[156],"strategy":[157],"enhances":[159],"effectively":[163],"merging":[164],"varied":[165],"types":[167],"different":[169],"mixing":[170],"characteristics.":[171]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
