Users of social applications like to be notified when their friends are online. Typically, this is done by a central server keeping track of who is online and offline, as well as of all of the users’ “buddy lists”, which contain sensitive information. We present DP5, a cryptographic service that implements online presence indication in a privacy-friendly way. DP5 allows clients to register their online presence and query the presence of their list of friends while keeping this list secret. Besides presence, high-integrity status updates are supported, to facilitate key update and rendezvous protocols. While infrastructure services are required for DP5 to operate, they are designed to not require any long-term secrets and provide perfect forward secrecy in case of compromise. We provide security arguments for the indistinguishability properties of the protocol, as well as an evaluation of its scalability and performance.
 J. Groth. Short pairing-based non-interactive zero-knowledge arguments. In M. Abe, editor, Advances in Cryptology - ASIACRYPT 2010 , pages 321–340. Springer, 2010.
 J. Guo, T. Peyrin, and A. Poschmann. The photon family of lightweight hash functions. In P. Rogaway, editor, CRYPTO , pages 222–239. Springer, 2011.
 IBM.com. IBM Food Trust Marketplace. https://www.ibm.com/us-en/marketplace/food-trust/purchase , accessed: 22 Aug. 2018.
 Aferdita Ibrahimi. Cloud computing: Pricing model. Journal of Advanced Computer Science and
arguments and their applications. In Computational Complexity, 2002. Proceedings. 17th IEEE Annual Conference on, pages 162-171. IEEE, 2002.
[BHKR13] Mihir Bellare, Viet Tung Hoang, Sriram Keelveedhi, and Phillip Rogaway. Efficient garbling from a fixedkey blockcipher. In Security and Privacy (SP), 2013 IEEE Symposium on, pages 478-492. IEEE, 2013.
[CADT14] Henry Carter, Chaitrali Amrutkar, Italo Dacosta, and Patrick Traynor. For your phone only: custom protocols for efficient secure function evaluation on mobile devices. Security and
An Efficient Communication System With Strong Anonymity
Albert Kwon, David Lazar, Srinivas Devadas and Bryan Ford
-knowledge argument for correctness of a shuffle. In Proceedings of the 31st Annual International Conference on Theory and Applications of Cryptographic Techniques, EUROCRYPT’12, pages 263-280, Berlin, Heidelberg, 2012. Springer-Verlag.
 M. Bellare, R. Canetti, and H. Krawczyk. Keying hash functions for message authentication. pages 1-15. Springer- Verlag, 1996.
 M. Bellare and C. Namprempre. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. J. Cryptol., 21(4):469-491, Sept. 2008
Zachary Weinberg, Mahmood Sharif, Janos Szurdi and Nicolas Christin
arguments for IDF.” Journal of Documentation 60.5 (2004), pp. 503-520.
 Andreas Sfakianakis, Elias Athanasopoulos, and Sotiris Ioannidis. “CensMon: A Web Censorship Monitor.” Free and Open Communications on the Internet. USENIX. 2011.
 Dick Sites. Compact Language Detection 2. Software library. 2013-.
 Kyle Soska and Nicolas Christin. “Automatically Detecting Vulnerable Websites Before They Turn Malicious.” USENIX Security Symposium. 2014, pp. 625-640.
 Ramesh Subramanian. “The Growth of
Alexandra-Mihaela Olteanu, Mathias Humbert, Kévin Huguenin and Jean-Pierre Hubaux
. Cosley, S. Suri, D. Huttenlocher, and J. Kleinberg. Inferring social ties from geographic coincidences. Proc. of PNAS , 107, 2010.
 R. Dey, C. Tang, K. Ross, and N. Saxena. Estimating age privacy leakage in online social networks. In INFOCOM , 2012.
 R. L. Fogues, P. K. Murukannaiah, J. M. Such, and M. P. Singh. Sharing policies in multiuser privacy scenarios: Incorporating context, preferences, and arguments in decision making. ACM Transactions on Computer-Human Interaction (TOCHI) , 24(1):5, 2017.
 D. Fudenberg and J. Tirole. Game
Sazzadur Rahaman, Long Cheng, Danfeng Daphne Yao, He Li and Jung-Min Jerry Park
Koyama and Yukio Tsuruoka. Speeding up elliptic cryptosystems by using a signed binary window method. In CRYPTO ’92 , pages 345–357, 1992.
 Klaus Potzmader and Johannes Winter et al. Group signatures on mobile devices: Practical experiences. In Trust and Trustworthy Computing , pages 47–64, 2013.
 David Pointcheval and Jacques Stern. Security arguments for digital signatures and blind signatures. J. Cryptology , 13(3):361–396, 2000.
Ghada Arfaoui, Jean-François Lalande, Jacques Traoré, Nicolas Desmoulins, Pascal Berthomé and Saïd Gharout
Cryptography, PKC ’99 , volume 1560 of LNCS , pages 223–234, Kamakura, Japan, Mar. 1999. Springer Berlin Heidelberg.
 T. Pedersen. . In J. Feigenbaum, editor, Advances in Cryptology - CRYPTO ’91 , volume 576 of LNCS , pages 129–140. Springer Berlin Heidelberg, 1992.
 D. Pointcheval and J. Stern. Security Proofs for Signature Schemes. In U. Maurer, editor, Advances in Cryptology - EUROCRYPT ’96 , volume 1070 of LNCS , pages 387–398. Springer Berlin Heidelberg, Saragossa, Spain, 1996.
 D. Pointcheval and J. Stern. Security arguments for