tralized networks into super-nodes. Further socio-
technical work in needed in understanding the mo-
tivations, usability, and political stakes of decentral-
ization. The ideology of decentralization has given us
very real advances in technology for ordinary users,
but much more is needed for liberation.
REFERENCES
Baran, P. et al. (1964). On distributed communications. Vol-
umes I-XI, RAND Corporation Research Documents,
August.
Ben-Sasson, E., Chiesa, A., Garman, C., Green, M., Miers,
I., Tromer, E., and Virza, M. (2014). Zerocash: De-
centralized anonymous payments from bitcoin. In
IEEE Symposium on Security and Privacy.
Chaum, D. and van Heyst, E. (1991). Group signatures. In
Advances in Cryptology.
Clarke, I., Sandberg, O., Wiley, B., and Hong, T. W. (2000).
Freenet: A distributed anonymous information stor-
age and retrieval system. In Designing Privacy En-
hancing Technologies, International Workshop on De-
sign Issues in Anonymity and Unobservability.
Danezis, G., D
´
ıaz, C., Troncoso, C., and Laurie, B. (2010).
Drac: An architecture for anonymous low-volume
communications. In 10th Privacy Enhancing Tech-
nologies Symposium.
Das, D., Meiser, S., Mohammadi, E., and Kate, A. (2018).
Anonymity trilemma: Strong anonymity, low band-
width overhead, low latency-choose two. In 2018
IEEE Symposium on Security and Privacy (SP), pages
108–126. IEEE.
DeCandia, G., Hastorun, D., Jampani, M., Kakulapati,
G., Lakshman, A., Pilchin, A., Sivasubramanian, S.,
Vosshall, P., and Vogels, W. (2007). Dynamo: Ama-
zon’s highly available key-value store. In ACM Sym-
posium on Operating Systems Principles: Proceed-
ings of twenty-first ACM SIGOPS symposium on Op-
erating systems principles, volume 14, pages 205–
220.
Dingledine, R., Mathewson, N., and Syverson, P. (2004).
Tor: The second-generation onion router. Proceedings
of the 13th USENIX Security Symposium, 2.
Douceur, J. R. (2002). The sybil attack. In 1st International
Worksop on Peer-to-Peer Systems.
Foster, I. D., Larson, J., Masich, M., Snoeren, A. C., Sav-
age, S., and Levchenko, K. (2015). Security by any
other name: On the effectiveness of provider based
email security. In Proceedings of the 22nd ACM
SIGSAC Conference on Computer and Communica-
tions Security, pages 450–464. ACM.
Goldberg, I., Ustaoglu, B., Gundy, M. V., and Chen, H.
(2009). Multi-party off-the-record messaging. In 16th
ACM Conference on Computer and Communications
Security.
Halpin, H. and Piekarska, M. (2017). Introduction to se-
curity and privacy on the blockchain. In 2017 IEEE
European Symposium on Security and Privacy Work-
shops (EuroS&PW), pages 1–3. IEEE.
Kobeissi, N., Bhargavan, K., and Blanchet, B. (2017). Auto-
mated verification for secure messaging protocols and
their implementations: A symbolic and computational
approach. In 2017 IEEE European Symposium on Se-
curity and Privacy (EuroS&P), pages 435–450. IEEE.
Lamport, L. (1978). Time, clocks, and the ordering of
events in a distributed system. Communications of the
ACM, 21(7).
Lamport, L., Shostak, R., and Pease, M. (1982). The
byzantine generals problem. ACM Transactions on
Programming Languages and Systems (TOPLAS),
4(3):382–401.
Minar, N. and Hedlund, P. (2001). A network of peers
– peer-to-peer models through the history of the in-
ternet. In Oram, A., editor, Peer-to-Peer: Harness-
ing the Power of Disruptive Technologies, pages 9–20.
O’Reilly, Sebastopol, CA.
Pfitzmann, A. and Hansen, M. (2005). Anonymity, un-
linkability, unobservability, pseudonymity, and iden-
tity management – a consolidated proposal for termi-
nology. Technical report.
Schr
¨
oder, S., Huber, M., Wind, D., and Rottermanner, C.
(2016). When signal hits the fan: on the usability and
security of state-of-the-art secure mobile messaging.
In European Workshop on Usable Security. IEEE.
Slobogin, C. (2014). Cause to believe what?: The impor-
tance of defining a search’s object–Or, how the ABA
would analyze the NSA metadata surveillance pro-
gram. Oklahoma Law Review, pages 14–7.
Troncoso, C., Isaakidis, M., Danezis, G., and Halpin,
H. (2017). Systematizing decentralization and pri-
vacy: Lessons from 15 years of research and deploy-
ments. Proceedings on Privacy Enhancing Technolo-
gies, 2017(4):404–426.
Unger, N., Dechand, S., Bonneau, J., Fahl, S., Perl, H.,
Goldberg, I., and Smith, M. (2015). Sok: Secure mes-
saging. In 2015 IEEE Symposium on Security and Pri-
vacy, pages 232–249. IEEE.
Wang, L. and Kangasharju, J. (2013). Measuring large-
scale distributed systems: case of BitTorrent mainline
DHT. In 13th IEEE International Conference on Peer-
to-Peer Computing.
Wolchok, S., Hofmann, O. S., Heninger, N., Felten, E. W.,
Halderman, J. A., Rossbach, C. J., Waters, B., and
Witchel, E. (2010). Defeating vanish with low-cost
sybil attacks against large dhts. In Network and Dis-
tributed System Security Symposium.
Yung, M. (2015). The mobile adversary paradigm in dis-
tributed computation and systems. In Proceedings
of the 2015 ACM Symposium on Principles of Dis-
tributed Computing, pages 171–172. ACM.
SECRYPT 2020 - 17th International Conference on Security and Cryptography
512