{"id":"https://openalex.org/W2963664972","doi":"https://doi.org/10.2478/popets-2019-0054","title":"Cryptography for #MeToo","display_name":"Cryptography for #MeToo","publication_year":2019,"publication_date":"2019-07-01","ids":{"openalex":"https://openalex.org/W2963664972","doi":"https://doi.org/10.2478/popets-2019-0054","mag":"2963664972"},"language":"en","primary_location":{"id":"doi:10.2478/popets-2019-0054","is_oa":true,"landing_page_url":"https://doi.org/10.2478/popets-2019-0054","pdf_url":"https://content.sciendo.com/downloadpdf/journals/popets/2019/3/article-p409.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://content.sciendo.com/downloadpdf/journals/popets/2019/3/article-p409.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5069090245","display_name":"Benjamin Kuykendall","orcid":null},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Benjamin Kuykendall","raw_affiliation_strings":["Princeton University"],"affiliations":[{"raw_affiliation_string":"Princeton University","institution_ids":["https://openalex.org/I20089843"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057824781","display_name":"Hugo Krawczyk","orcid":"https://orcid.org/0000-0003-3130-1888"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hugo Krawczyk","raw_affiliation_strings":["Algorand Foundation"],"affiliations":[{"raw_affiliation_string":"Algorand Foundation","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038752563","display_name":"Tal Rabin","orcid":"https://orcid.org/0000-0003-1386-605X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Tal Rabin","raw_affiliation_strings":["Algorand Foundation"],"affiliations":[{"raw_affiliation_string":"Algorand Foundation","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5069090245"],"corresponding_institution_ids":["https://openalex.org/I20089843"],"apc_list":null,"apc_paid":null,"fwci":1.4002,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.86283094,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"2019","issue":"3","first_page":"409","last_page":"429"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7756929397583008},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.7291193008422852},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5896807909011841},{"id":"https://openalex.org/keywords/harassment","display_name":"Harassment","score":0.57854163646698},{"id":"https://openalex.org/keywords/sexual-assault","display_name":"Sexual assault","score":0.5521048903465271},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5096309185028076},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.49189329147338867},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.47745969891548157},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.46976137161254883},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.32498788833618164},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.3049970269203186},{"id":"https://openalex.org/keywords/poison-control","display_name":"Poison control","score":0.12288272380828857},{"id":"https://openalex.org/keywords/human-factors-and-ergonomics","display_name":"Human factors and ergonomics","score":0.07610353827476501}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7756929397583008},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.7291193008422852},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5896807909011841},{"id":"https://openalex.org/C2778976716","wikidata":"https://www.wikidata.org/wiki/Q3240539","display_name":"Harassment","level":2,"score":0.57854163646698},{"id":"https://openalex.org/C2994210853","wikidata":"https://www.wikidata.org/wiki/Q673281","display_name":"Sexual assault","level":4,"score":0.5521048903465271},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5096309185028076},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.49189329147338867},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.47745969891548157},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.46976137161254883},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.32498788833618164},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.3049970269203186},{"id":"https://openalex.org/C3017944768","wikidata":"https://www.wikidata.org/wiki/Q1450463","display_name":"Poison control","level":2,"score":0.12288272380828857},{"id":"https://openalex.org/C166735990","wikidata":"https://www.wikidata.org/wiki/Q1750812","display_name":"Human factors and ergonomics","level":3,"score":0.07610353827476501},{"id":"https://openalex.org/C99454951","wikidata":"https://www.wikidata.org/wiki/Q932068","display_name":"Environmental health","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.2478/popets-2019-0054","is_oa":true,"landing_page_url":"https://doi.org/10.2478/popets-2019-0054","pdf_url":"https://content.sciendo.com/downloadpdf/journals/popets/2019/3/article-p409.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:b7832c5543cd4f34a6826f4bffedb4e4","is_oa":true,"landing_page_url":"https://doaj.org/article/b7832c5543cd4f34a6826f4bffedb4e4","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Proceedings on Privacy Enhancing Technologies, Vol 2019, Iss 3, Pp 409-429 (2019)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.2478/popets-2019-0054","is_oa":true,"landing_page_url":"https://doi.org/10.2478/popets-2019-0054","pdf_url":"https://content.sciendo.com/downloadpdf/journals/popets/2019/3/article-p409.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.6700000166893005,"display_name":"Gender equality","id":"https://metadata.un.org/sdg/5"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2963664972.pdf","grobid_xml":"https://content.openalex.org/works/W2963664972.grobid-xml"},"referenced_works_count":29,"referenced_works":["https://openalex.org/W19911921","https://openalex.org/W120930527","https://openalex.org/W147290027","https://openalex.org/W160736378","https://openalex.org/W1492124753","https://openalex.org/W1499934958","https://openalex.org/W1502053990","https://openalex.org/W1589034595","https://openalex.org/W1867048327","https://openalex.org/W1885156594","https://openalex.org/W1970823784","https://openalex.org/W1997820219","https://openalex.org/W2006453614","https://openalex.org/W2036133214","https://openalex.org/W2077315235","https://openalex.org/W2095708839","https://openalex.org/W2097911709","https://openalex.org/W2108834246","https://openalex.org/W2117797270","https://openalex.org/W2143087446","https://openalex.org/W2143824669","https://openalex.org/W2149093588","https://openalex.org/W2163614799","https://openalex.org/W2164794711","https://openalex.org/W2172174332","https://openalex.org/W2473777923","https://openalex.org/W2741945342","https://openalex.org/W2809460294","https://openalex.org/W2911825405"],"related_works":["https://openalex.org/W4387497383","https://openalex.org/W3183948672","https://openalex.org/W3173606202","https://openalex.org/W3110381201","https://openalex.org/W2948807893","https://openalex.org/W2935909890","https://openalex.org/W2778153218","https://openalex.org/W2758277628","https://openalex.org/W1531601525","https://openalex.org/W2530773950"],"abstract_inverted_index":{"Abstract":[0],"Reporting":[1],"sexual":[2,40,45],"assault":[3,46],"and":[4,9,32,52,65,138],"harassment":[5],"is":[6,56],"an":[7,182],"important":[8],"difficult":[10],"problem.":[11],"Since":[12],"late":[13],"2017,":[14],"it":[15],"has":[16,25],"received":[17],"increased":[18],"attention":[19],"as":[20,109,141,143],"the":[21,37,89,93,110,120,133,136,139,144,151],"viral":[22],"#MeToo":[23],"movement":[24],"brought":[26],"about":[27],"accusations":[28,85,94],"against":[29,88],"high-profile":[30],"individuals":[31],"a":[33,48,69,81,98,127],"wider":[34],"discussion":[35],"around":[36],"prevalence":[38],"of":[39,44,84,113,122,135,146,158],"violence.":[41],"Addressing":[42],"occurrences":[43],"requires":[47],"system":[49],"to":[50,58,97,103,154],"record":[51],"process":[53],"accusations.":[54,148],"It":[55],"natural":[57],"ask":[59],"what":[60],"security":[61,129,159],"guarantees":[62],"are":[63,86,173],"necessary":[64],"achievable":[66],"in":[67,175],"such":[68,108],"system.":[70],"In":[71],"particular,":[72],"we":[73],"focus":[74],"on":[75,119],"detecting":[76],"repeat":[77],"offenders:":[78],"only":[79],"when":[80],"set":[82],"number":[83],"lodged":[87],"same":[90],"party":[91],"will":[92],"be":[95,185],"revealed":[96],"legal":[99],"counselor.":[100],"Previous":[101],"solutions":[102],"this":[104,156],"privacy-preserving":[105],"reporting":[106],"problem,":[107],"Callisto":[111],"Protocol":[112],"Rajan":[114],"et":[115],"al.,":[116],"have":[117],"focused":[118],"confidentiality":[121,134],"accusers.":[123],"This":[124],"paper":[125],"proposes":[126],"stronger":[128],"model":[130],"that":[131,172,181],"ensures":[132],"accuser":[137],"accused":[140],"well":[142],"traceability":[145],"false":[147],"We":[149,179],"propose":[150],"WhoToo":[152],"protocol":[153,165],"achieve":[155],"notion":[157],"using":[160],"suitable":[161],"cryptographic":[162],"techniques.":[163],"The":[164],"design":[166],"emphasizes":[167],"practicality,":[168],"preferring":[169],"fast":[170],"operations":[171],"implemented":[174],"existing":[176],"software":[177],"libraries.":[178],"estimate":[180],"implementation":[183],"would":[184],"suitably":[186],"performant":[187],"for":[188],"real-world":[189],"deployment.":[190]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2019-07-30T00:00:00"}
