{"id":"https://openalex.org/W4383221560","doi":"https://doi.org/10.1145/3579856.3595785","title":"How Secure Are The Main Real-World Mix Networks \u2014 Case Studies To Explore Vulnerabilities And Usability","display_name":"How Secure Are The Main Real-World Mix Networks \u2014 Case Studies To Explore Vulnerabilities And Usability","publication_year":2023,"publication_date":"2023-07-05","ids":{"openalex":"https://openalex.org/W4383221560","doi":"https://doi.org/10.1145/3579856.3595785"},"language":"en","primary_location":{"id":"doi:10.1145/3579856.3595785","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3579856.3595785","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068373857","display_name":"Kun Peng","orcid":"https://orcid.org/0009-0000-2433-8610"},"institutions":[{"id":"https://openalex.org/I165143802","display_name":"The University of Queensland","ror":"https://ror.org/00rqy9422","country_code":"AU","type":"education","lineage":["https://openalex.org/I165143802"]},{"id":"https://openalex.org/I2250955327","display_name":"Huawei Technologies (China)","ror":"https://ror.org/00cmhce21","country_code":"CN","type":"company","lineage":["https://openalex.org/I2250955327"]}],"countries":["AU","CN"],"is_corresponding":true,"raw_author_name":"Kun Peng","raw_affiliation_strings":["Huawei Technology Ltd, China and University of Queensland, Australia"],"raw_orcid":"https://orcid.org/0009-0000-2433-8610","affiliations":[{"raw_affiliation_string":"Huawei Technology Ltd, China and University of Queensland, Australia","institution_ids":["https://openalex.org/I2250955327","https://openalex.org/I165143802"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5068373857"],"corresponding_institution_ids":["https://openalex.org/I165143802","https://openalex.org/I2250955327"],"apc_list":null,"apc_paid":null,"fwci":0.5112,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.7065467,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"539","last_page":"551"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7984728217124939},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6532465815544128},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5624654293060303},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.48711395263671875},{"id":"https://openalex.org/keywords/compromise","display_name":"Compromise","score":0.4702027440071106},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.4652211666107178},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.4386478066444397},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4210916757583618},{"id":"https://openalex.org/keywords/service-provider","display_name":"Service provider","score":0.4182067811489105},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.29995858669281006},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.13878130912780762}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7984728217124939},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6532465815544128},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5624654293060303},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.48711395263671875},{"id":"https://openalex.org/C46355384","wikidata":"https://www.wikidata.org/wiki/Q726686","display_name":"Compromise","level":2,"score":0.4702027440071106},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.4652211666107178},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.4386478066444397},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4210916757583618},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.4182067811489105},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.29995858669281006},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.13878130912780762},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3579856.3595785","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3579856.3595785","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","score":0.4000000059604645,"display_name":"Partnerships for the goals"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W111294696","https://openalex.org/W207307977","https://openalex.org/W1523654887","https://openalex.org/W2009923502","https://openalex.org/W2017150861","https://openalex.org/W2046590706","https://openalex.org/W2095708839","https://openalex.org/W2109365902","https://openalex.org/W2145801920","https://openalex.org/W2251495264","https://openalex.org/W2350778671","https://openalex.org/W2561675875","https://openalex.org/W2965135529","https://openalex.org/W4230014050","https://openalex.org/W4299301436"],"related_works":["https://openalex.org/W2801622120","https://openalex.org/W2164141394","https://openalex.org/W3036524962","https://openalex.org/W4240977217","https://openalex.org/W1967649051","https://openalex.org/W2508088450","https://openalex.org/W2389434635","https://openalex.org/W4214750239","https://openalex.org/W2279908259","https://openalex.org/W2811264706"],"abstract_inverted_index":{"Mix":[0],"net":[1,83,102,133,157,191],"is":[2,56,127,172],"the":[3,13,115,124,161,168,184],"most":[4],"frequently":[5],"used":[6],"secure":[7],"MPC":[8],"(multi-party":[9],"computation)":[10],"application":[11],"in":[12,59,66,117,150,179,192,205],"real":[14],"world,":[15],"where":[16],"multiple":[17],"routers":[18],"cooperates":[19],"to":[20,33,135,164],"anonymise":[21],"a":[22,39,90,99,131,155,173],"batch":[23],"of":[24,42,53,114,154,167],"data.":[25],"It":[26],"builds":[27],"an":[28,94],"important":[29],"network":[30,206],"security":[31,52,65,109,207],"mechanism":[32],"implement":[34],"anonymous":[35,185],"communication":[36,186],"and":[37,47,63,87,104,130,139,202],"has":[38,69,134],"wide":[40],"range":[41],"applications":[43,204],"like":[44],"AI":[45],"training":[46],"online":[48],"services.":[49],"So":[50],"far,":[51],"mix":[54,82,101,132,156,169,190],"nets":[55],"only":[57],"analysed":[58],"theoretic":[60,108],"cryptographic":[61,180],"models,":[62],"their":[64,142,203],"real-world":[67,100],"systems":[68,116],"not":[70,128,196],"drawn":[71],"enough":[72],"attention":[73],"from":[74],"researchers.":[75],"In":[76],"this":[77],"paper,":[78],"several":[79],"popular":[80],"commercial":[81],"services":[84,187],"are":[85,195],"surveyed":[86],"they":[88],"have":[89,208],"common":[91],"strategy:":[92],"developing":[93],"academic":[95,143],"shuffling":[96],"scheme":[97],"into":[98],"system":[103],"assuming":[105],"that":[106,123,149],"its":[107],"properties":[110],"can":[111],"guarantee":[112],"robustness":[113],"practical":[118,193],"usages.":[119],"Our":[120],"analysis":[121],"illustrates":[122],"straightforward":[125],"assumption":[126],"reliable":[129,198],"face":[136],"various":[137],"challenges":[138],"attackers":[140],"beyond":[141],"prototypes":[144],"estimate.":[145],"Especially,":[146],"we":[147],"show":[148],"practice":[151],"some":[152],"users":[153],"may":[158],"collude":[159],"with":[160],"service":[162],"providers":[163],"compromise":[165],"reliability":[166],"net,":[170],"which":[171],"realistic":[174],"environment":[175],"factor":[176],"usually":[177],"ignored":[178],"protocol":[181],"design.":[182],"So,":[183],"based":[188],"on":[189],"usage":[194],"so":[197],"as":[199],"widely":[200],"believed":[201],"non-negligible":[209],"vulnerabilities":[210],"or":[211],"risks.":[212]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
