{"id":"https://openalex.org/W4385522426","doi":"https://doi.org/10.56553/popets-2023-0104","title":"The Self-Anti-Censorship Nature of Encryption: On the Prevalence of Anamorphic Cryptography","display_name":"The Self-Anti-Censorship Nature of Encryption: On the Prevalence of Anamorphic Cryptography","publication_year":2023,"publication_date":"2023-08-03","ids":{"openalex":"https://openalex.org/W4385522426","doi":"https://doi.org/10.56553/popets-2023-0104"},"language":"en","primary_location":{"id":"doi:10.56553/popets-2023-0104","is_oa":true,"landing_page_url":"https://doi.org/10.56553/popets-2023-0104","pdf_url":"https://petsymposium.org/popets/2023/popets-2023-0104.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://petsymposium.org/popets/2023/popets-2023-0104.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020329764","display_name":"Miros\u0142aw Kuty\u0142owski","orcid":"https://orcid.org/0000-0003-3192-2430"},"institutions":[{"id":"https://openalex.org/I11923345","display_name":"Wroc\u0142aw University of Science and Technology","ror":"https://ror.org/008fyn775","country_code":"PL","type":"education","lineage":["https://openalex.org/I11923345"]}],"countries":["PL"],"is_corresponding":true,"raw_author_name":"Miroslaw Kutylowski","raw_affiliation_strings":["Wroclaw University of Science and Technology, and NASK"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Wroclaw University of Science and Technology, and NASK","institution_ids":["https://openalex.org/I11923345"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050503720","display_name":"Giuseppe Persiano","orcid":"https://orcid.org/0000-0001-6579-4807"},"institutions":[{"id":"https://openalex.org/I1291425158","display_name":"Google (United States)","ror":"https://ror.org/00njsd438","country_code":"US","type":"company","lineage":["https://openalex.org/I1291425158","https://openalex.org/I4210128969"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Giuseppe Persiano","raw_affiliation_strings":["Universit\u00e0 di Salerno and Google LLC"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Universit\u00e0 di Salerno and Google LLC","institution_ids":["https://openalex.org/I1291425158"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039435782","display_name":"Duong Hieu Phan","orcid":"https://orcid.org/0000-0003-1136-4064"},"institutions":[{"id":"https://openalex.org/I12356871","display_name":"T\u00e9l\u00e9com Paris","ror":"https://ror.org/01naq7912","country_code":"FR","type":"education","lineage":["https://openalex.org/I12356871","https://openalex.org/I205703379","https://openalex.org/I4210145102"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Duong Hieu Phan","raw_affiliation_strings":["Telecom Paris, Institute Polytechnique de Paris"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Telecom Paris, Institute Polytechnique de Paris","institution_ids":["https://openalex.org/I12356871"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030243906","display_name":"Moti Yung","orcid":"https://orcid.org/0000-0003-0848-0873"},"institutions":[{"id":"https://openalex.org/I1291425158","display_name":"Google (United States)","ror":"https://ror.org/00njsd438","country_code":"US","type":"company","lineage":["https://openalex.org/I1291425158","https://openalex.org/I4210128969"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Moti Yung","raw_affiliation_strings":["Google LLC and Columbia University"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Google LLC and Columbia University","institution_ids":["https://openalex.org/I1291425158"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019098287","display_name":"Marcin Zawada","orcid":"https://orcid.org/0000-0002-7097-3284"},"institutions":[{"id":"https://openalex.org/I11923345","display_name":"Wroc\u0142aw University of Science and Technology","ror":"https://ror.org/008fyn775","country_code":"PL","type":"education","lineage":["https://openalex.org/I11923345"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Marcin Zawada","raw_affiliation_strings":["Wroclaw University of Science and Technology"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Wroclaw University of Science and Technology","institution_ids":["https://openalex.org/I11923345"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5020329764"],"corresponding_institution_ids":["https://openalex.org/I11923345"],"apc_list":null,"apc_paid":null,"fwci":3.5306,"has_fulltext":true,"cited_by_count":21,"citation_normalized_percentile":{"value":0.94126107,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"2023","issue":"4","first_page":"170","last_page":"183"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8012037873268127},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.5999679565429688},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5755309462547302},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5659328103065491},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5408087968826294},{"id":"https://openalex.org/keywords/56-bit-encryption","display_name":"56-bit encryption","score":0.5363404154777527},{"id":"https://openalex.org/keywords/multiple-encryption","display_name":"Multiple encryption","score":0.48561158776283264},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.4610629975795746},{"id":"https://openalex.org/keywords/40-bit-encryption","display_name":"40-bit encryption","score":0.43464523553848267},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.41929030418395996},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.40611976385116577},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.255337119102478}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8012037873268127},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.5999679565429688},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5755309462547302},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5659328103065491},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5408087968826294},{"id":"https://openalex.org/C46905813","wikidata":"https://www.wikidata.org/wiki/Q4640678","display_name":"56-bit encryption","level":4,"score":0.5363404154777527},{"id":"https://openalex.org/C184685986","wikidata":"https://www.wikidata.org/wiki/Q3505167","display_name":"Multiple encryption","level":3,"score":0.48561158776283264},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.4610629975795746},{"id":"https://openalex.org/C158215988","wikidata":"https://www.wikidata.org/wiki/Q4637271","display_name":"40-bit encryption","level":3,"score":0.43464523553848267},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.41929030418395996},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.40611976385116577},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.255337119102478}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.56553/popets-2023-0104","is_oa":true,"landing_page_url":"https://doi.org/10.56553/popets-2023-0104","pdf_url":"https://petsymposium.org/popets/2023/popets-2023-0104.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},{"id":"pmh:oai:HAL:hal-04194142v1","is_oa":true,"landing_page_url":"https://hal.science/hal-04194142","pdf_url":"https://hal.science/hal-04194142/document","source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Proceedings on Privacy Enhancing Technologies, 2023, 2023 (4), pp.170-183. &#x27E8;10.56553/popets-2023-0104&#x27E9;","raw_type":"Journal articles"}],"best_oa_location":{"id":"doi:10.56553/popets-2023-0104","is_oa":true,"landing_page_url":"https://doi.org/10.56553/popets-2023-0104","pdf_url":"https://petsymposium.org/popets/2023/popets-2023-0104.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.8100000023841858,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320335039","display_name":"Narodowe Centrum Bada\u0144 i Rozwoju","ror":"https://ror.org/05pwfyy15"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4385522426.pdf"},"referenced_works_count":32,"referenced_works":["https://openalex.org/W139582188","https://openalex.org/W146232293","https://openalex.org/W1479681406","https://openalex.org/W1497619716","https://openalex.org/W1520041135","https://openalex.org/W1527181506","https://openalex.org/W1552695147","https://openalex.org/W1575827919","https://openalex.org/W1835586838","https://openalex.org/W1878907771","https://openalex.org/W1990817838","https://openalex.org/W2007643787","https://openalex.org/W2012654427","https://openalex.org/W2062424686","https://openalex.org/W2073210531","https://openalex.org/W2074594718","https://openalex.org/W2101803085","https://openalex.org/W2116050022","https://openalex.org/W2119183040","https://openalex.org/W2132172731","https://openalex.org/W2165111290","https://openalex.org/W2354379805","https://openalex.org/W2397223326","https://openalex.org/W2753819115","https://openalex.org/W2820688723","https://openalex.org/W2950492851","https://openalex.org/W2952280630","https://openalex.org/W3157587990","https://openalex.org/W3211484452","https://openalex.org/W4210300416","https://openalex.org/W4246562921","https://openalex.org/W4285284741"],"related_works":["https://openalex.org/W2361619969","https://openalex.org/W2188276378","https://openalex.org/W2396533199","https://openalex.org/W2387840805","https://openalex.org/W4387191618","https://openalex.org/W1993945719","https://openalex.org/W4387429380","https://openalex.org/W3149394126","https://openalex.org/W4246652009","https://openalex.org/W1976536045"],"abstract_inverted_index":{"As":[0],"part":[1],"of":[2,12,25,35,120,134,142,166,189,207,236,240,247,291,321],"the":[3,6,10,68,72,79,105,113,118,132,140,164,179,183,200,224,229,232,237,245,251,262,285,288,310,314,319,322],"responses":[4],"to":[5,62,139,152,160,195,275],"ongoing":[7,263],"crypto":[8],"wars,":[9],"notion":[11,19,119,133],"Anamorphic":[13,121,135,173],"Encryption":[14,136,149,157,174],"was":[15,86],"put":[16],"forth.":[17],"The":[18,55],"allows":[20],"private":[21,45],"communication":[22,162],"in":[23,31,67,99,124,178,182,209,261,277,300],"spite":[24],"a":[26],"dictator":[27,252],"who":[28],"is":[29,97,215],"engaged":[30],"an":[32,216],"extreme":[33],"form":[34],"surveillance":[36],"and":[37,47,49,75,115,155,185,242,255,296,305,308],"or":[38,93],"censorship,":[39],"where":[40],"it":[41,298],"asks":[42],"for":[43,150,158,254],"all":[44,53],"keys":[46],"knows":[48],"may":[50],"even":[51,256],"dictate":[52],"messages.":[54],"original":[56],"work":[57,230],"pointed":[58],"out":[59],"efficient":[60],"ways":[61],"use":[63,246],"two":[64],"known":[65],"schemes":[66],"anamorphic":[69,95,217],"mode,":[70],"bypassing":[71],"draconian":[73],"censorship":[74,243],"hiding":[76],"information":[77],"from":[78],"all-powerful":[80],"dictator.":[81,286],"A":[82],"question":[83],"left":[84],"open":[85],"whether":[87,94],"these":[88],"examples":[89,214],"are":[90,282,316],"outlier":[91],"results":[92],"mode":[96],"pervasive":[98],"existing":[100],"systems.":[101],"Here":[102],"we":[103,108,146,186,293],"answer":[104],"above":[106],"question:":[107],"develop":[109],"new":[110],"techniques,":[111],"expand":[112],"notion,":[114],"show":[116,171,294],"that":[117,172,191],"Cryptography":[122],"is,":[123],"fact,":[125],"very":[126,233],"much":[127,220],"prevalent.":[128],"We":[129,169],"first":[130],"refine":[131],"with":[137,219],"respect":[138],"nature":[141],"covert":[143],"communication.":[144],"Specifically,":[145],"distinguish":[147],"Single-Receiver":[148],"many":[151,159,161],"one":[153],"communication,":[154],"Multiple-Receiver":[156],"within":[163],"group":[165],"conspiring":[167],"users.":[168],"then":[170],"can":[175,192],"be":[176,193],"embedded":[177],"randomness":[180],"used":[181],"encryption,":[184],"give":[187],"families":[188,201],"constructions":[190],"applied":[194],"numerous":[196],"ciphers.":[197],"In":[198,227],"total":[199],"cover":[202],"classical":[203],"encryption":[204,249,272],"schemes,":[205],"some":[206],"which":[208,271],"actual":[210,289],"use.":[211],"Among":[212],"our":[213],"channel":[218],"higher":[221],"capacity":[222],"than":[223,258],"regular":[225],"channel.":[226],"sum,":[228],"shows":[231],"large":[234],"extent":[235],"potential":[238],"futility":[239,320],"control":[241],"over":[244],"strong":[248],"by":[250],"(typical":[253],"stronger":[257],"governments":[259],"engaging":[260],"crypto-wars):":[264],"While":[265,287],"such":[266],"limitations":[267],"obviously":[268],"hurt":[269],"utility":[270],"typically":[273],"brings":[274],"safety":[276],"computing":[278],"systems,":[279],"they":[280],"essentially,":[281],"not":[283],"helping":[284],"implications":[290],"what":[292,297],"here":[295],"means":[299],"practice":[301],"require":[302],"further":[303],"policy":[304],"legal":[306],"analyses":[307],"perspectives,":[309],"technical":[311],"aspects":[312],"regarding":[313],"issues":[315],"clearly":[317],"showing":[318],"war":[323],"against":[324],"Cryptography.":[325]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":1}],"updated_date":"2026-05-07T13:39:58.223016","created_date":"2025-10-10T00:00:00"}
