1. [1] N. Alexopoulos, A. Kiayias, R. Talviste, and T. Zacharias, MCMix: Anonymous Messaging via Secure Multiparty Computation, in Proceedings of the 26th USENIX Security Symposium, USENIX Association, 2017, pp. 1217–1234.
2. [2] M. Ando, A. Lysyanskaya, and E. Upfal, Practical and Provably Secure Onion Routing, in Proceedings of the 45th International Colloquium on Automata, Languages, and Programming (ICALP), Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, 2018, pp. 144:1–144:14.
3. [3], On the Complexity of Anonymous Communication Through Public Networks, CoRR arXiv, abs/1902.06306 (2019).
4. [4] S. Angel and S. Setty, Unobservable Communication over Fully Untrusted Infrastructure, in Proceedings of the 12th USENIX Conference on Operating Systems Design and Implementation (OSDI), USENIX Association, 2016, pp. 551–569.
5. [5] G. R. Blakley and C. Meadows, Security of ramp schemes, in Advances in Cryptology, 1985, pp. 242–268.