[en] Many central banks are researching and piloting digital versions of fiat money, specifically retail central bank digital currencies (CBDCs). Core to many discussions revolving around these systems’ design is the ability to perform transactions even without network connectivity. While this approach is generally believed to provide additional degrees of freedom for user privacy, the lack of direct involvement of third parties in these offline transfers also interferes with key regulatory requirements that need to be accommodated in the financial space. This paper presents a compliance-by-design approach to evaluate technologies that can balance privacy with antimoney laundering and counter-terrorism financing (AML/CFT) measures. It classifies privacy design options and corresponding technical building blocks for offline CBDCs, along with their impact on AML/CFT measures, and outlines commonalities and differences between offline and online solutions. As such, it provides a conceptual framework for further techno-legal assessments and implementations.
Research center :
NCER-FT - FinTech National Centre of Excellence in Research Interdisciplinary Centre for Security, Reliability and Trust (SnT) > FINATRAX - Digital Financial Services and Cross-organizational Digital Transformations
Disciplines :
Management information systems Computer science Law, criminology & political science: Multidisciplinary, general & others
Author, co-author :
Michalopoulos, Panagiotis ; University of Toronto, Department of Electrical and Computer Engineering, Canada
Olowookere, Odunayo ; York University, Osgoode Hall Law School, United States
POCHER, Nadia ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > FINATRAX
Sedlmeir, Johannes ; University of Luxembourg, Interdisciplinary Centre for Security, Reliability and Trust (SnT), Luxembourg
Veneris, Andreas; University of Toronto, Department of Electrical and Computer Engineering, Canada ; University of Toronto, Department of Computer Science, United States
Puri, Poonam; York University, Osgoode Hall Law School, United States
External co-authors :
yes
Language :
English
Title :
Privacy and Compliance Design Options in Offline Central Bank Digital Currencies
Publication date :
2025
Journal title :
IEEE Transactions on Network and Service Management
ISSN :
1932-4537
Publisher :
Institute of Electrical and Electronics Engineers Inc.
FNR16570468 - NCER-FT - 2021 (01/03/2023-28/02/2025) - Gilbert Fridgen FNR13342933 - DFS - Paypal-fnr Pearl Chair In Digital Financial Services, 2019 (01/01/2020-31/12/2024) - Gilbert Fridgen FNR16326754 - PABLO - Privacy-preserving Tokenisation Of Artworks, 2021 (01/06/2022-31/05/2025) - Gilbert Fridgen
Funders :
Luxembourg National Research Fund PayPal-FNR, PEARL Banque et Caisse d’Épargne de l’État, Luxembourg
Funding text :
The contributions of Nadia Pocher and Johannes Sedlmeir were funded by Luxembourg National Research Fund (FNR), grant reference NCER22/IS/16570468/NCER-FT (CryptoReg) and grant reference 16326754 (PABLO), as well as by PayPal-FNR, PEARL grant reference 13342933/Gilbert Fridgen. We are also grateful for the support by Banque et Caisse d\u2019\u00C9pargne de l\u2019\u00C9tat, Luxembourg (Spuerkeess).
A. Kosse and I. Mattei, “Making headway. Results of the 2022 BIS survey on central bank digital currencies and crypto,” 2023. [Online]. Available: https://www.bis.org/publ/bppdf/bispap136.pdf
Atlantic Council. Central bank digital currency tracker. [Online]. Available: https://www.atlanticcouncil.org/cbdctracker/
Bank for International Settlements, “Central bank digital currencies: Foundational principles and core features,” 2020. [Online]. Available: https://www.bis.org/publ/othp33.htm
S. Allen, S. Čapkun, I. Eyal, G. Fanti, B. Ford, J. Grimmelmann, A. Juels, K. Kostiainen, S. john, A. Miller, E. Prasad, K. Wüst, and F. Zhang, “Design choices for central bank digital currency: Policy and technical considerations,” 2020. [Online]. Available: https://www.nber.org/papers/w27634
Bank of Canada, “A Digital Canadian Dollar: What we heard 2020–23 and what comes next,” 2023. [Online]. Available: https://www.bankofcanada.ca/digitaldollar/a- digital- canadian- dollar- what- w e-heard-2020-23-and-what-comes-next/
B. J. Tan, “Central bank digital currency and financial inclusion,” Journal of Macroeconomics, vol. 81, p. 103620, Sep. 2024. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S0164070 424000351
Bank for International Settlements, “Project Polaris: Handbook for offline payments with CBDC,” 2023. [Online]. Available: https://www.bis.org/publ/othp64.htm
B. Brodsky, A. Dubey, and D. Tercero Lucas, “Enabling offline payments in an online world. A practical guide to offline payment design,” 2023. [Online]. Available: https://www.lipisadvisors.com/whitepapers
K. Attarde, C. Jaiswal, R. Khatwani, G. Pinto, and V. Kumar, “A novel central bank digital currency framework design for offline and foreign transactions based on blockchain,” Digital Policy, Regulation and Governance, vol. 27, no. 2, pp. 201–220, Jan. 2025.
C. Beer, S. Zingg, K. Kostiainen, K. Wüst, V. Capkun, and S. Capkun, “Payoff: A regulated central bank digital currency with private offline payments,” 2024. [Online]. Available: https://arxiv.org/abs/2408.06956
M. Christodorescu, W. C. Gu, R. Kumaresan, M. Minaei, M. Ozdayi, B. Price, S. Raghuraman, M. Saad, C. Sheffield, M. Xu, and M. Zamani, “Towards a two-tier hierarchical infrastructure: An offline payment system for central bank digital currencies,” 2020. [Online]. Available: https://arxiv.org/abs/2012.08003
European Commission, “Proposal for a regulation of the European Parliament and of the Council on the establishment of the digital euro,” 2023. [Online]. Available: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A52023PC0369
S. Choi, B. Kim, Y.-S. Kim, and O. Kwon, “Central bank digital currency and privacy: A randomized survey experiment,” 2023. [Online]. Available: https://www.bis.org/publ/work1147.htm
A. Cupak, P. Gertler, D. Hajdiak, J. Klacso, and Š. Rychtárik, “Survey of potential users of the digital euro: New evidence from Slovakia,” 2024, National Bank of Slovakia Occasional paper 2/2024. [Online]. Available: https://nbs.sk/dokument/83315e7e-3523-49e6-a4dc-46b91dcbcdd0/stiahnut/
N. Pocher and A. Veneris, Central Bank Digital Currencies. Springer International Publishing, 2022, pp. 463–501. [Online]. Available: https://doi.org/10.1007/978-3-031-07535-3_15
G. Fanti and N. Pocher, “Privacy in cross-border digital currency: A transatlantic perspective,” in Frankfurt Forum on European-US GeoEconomics, 2022. [Online]. Available: https://www.atlanticcouncil.org/wp-content/uploads/2022/09/Privacy_in_cross-border_digital_curre ncy-_A_transatlantic_approach_-.pdf
Bank for International Settlements, “Project Tourbillon: Exploring privacy, security and scalability for CBDCs,” 2023. [Online]. Available: https://www.bis.org/publ/othp80.htm
J. Gross, J. Sedlmeir, M. Babel, A. Bechtel, and B. Schellinger, “Designing a central bank digital currency with support for cash-like privacy,” 2021. [Online]. Available: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3891121
M. Cipriani, L. S. Goldberg, and G. La Spada, “Financial sanctions, SWIFT, and the architecture of the international payment system,” Journal of Economic Perspectives, vol. 37, no. 1, pp. 31–52, 2023.
N. Pocher and A. Veneris, “Privacy and transparency in CBDCs: A regulation-by-design AML/CFT scheme,” IEEE Transactions on Network and Service Management, vol. 19, no. 2, pp. 1776–1788, 2022.
P. Michalopoulos, O. Olowookere, N. Pocher, J. Sedlmeir, A. Veneris, and P. Puri, “Compliance design options for offline CBDCs: Balancing privacy and AML/CFT,” in 2024 IEEE International Conference on Blockchain and Cryptocurrency. IEEE, May 2024, pp. 307–315.
R. Auer, G. Cornelli, and J. Frost, “Rise of the central bank digital currencies: drivers, approaches and technologies,” 2020. [Online]. Available: https://www.bis.org/publ/work880.htm
G. Goodell, H. D. Al-Nakib, and P. Tasca, “A digital currency architecture for privacy and owner-custodianship,” Future Internet, vol. 13, no. 5, p. 130, 2021. [Online]. Available: https://doi.org/10.3390/fi13050130
R. J. Garratt, M. J. Lee, B. Malone, and A. Martin, “Token-or account-based? A digital currency can be both,” 2020. [Online]. Available: https://ideas.repec.org/p/fip/fednls/88550.html
J. Kiff, “Taking digital currencies offline.” [Online]. Available: https://www.imf.org/en/Publications/fandd/issues/2022/09/kiff-taking-d igital-currencies-offline
“CBDCs: it’s time for action,” Official Monetary and Financial Institutions Forum, Tech. Rep., Feb. 2025. [Online]. Available: https://www.gi-de.com/corporate/Currency_Technology/Central_Bank_Digit al_Currencies/Retail_CBDC/GD-OMFIF-2025-CBDCs-Report.pdf
C. Minwalla, J. Miedema, S. Hernandez, and A. Sutton-Lalani, “A central bank digital currency for offline payments,” 2023, Bank of Canada working paper 2023-2. [Online]. Available: https://www.bankofcanada.ca/2023/02/staff-analytical-note-2023-2/
Y. Chu, J. Lee, S. Kim, H. Kim, Y. Yoon, and H. Chung, “Review of offline payment function of CBDC considering security requirements,” Applied Sciences, vol. 12, no. 9, p. 4488, 2022.
A. Tsareva and M. Komarov, “Retail central bank digital currency design choices: Guide for policymakers,” IEEE Access, vol. 12, pp. 66 129–66 146, 2024.
GlobalPlatform, “Introduction to secure elements,” 2018. [Online]. Available: https://globalplatform.wpengine.com/resource-publication/introduction-to-secure-elements/
K. Mayes, An Introduction to Smart Cards. Springer International Publishing, 2017, pp. 1–29. [Online]. Available: https://doi.org/10.1007/978-3-319-50500-8_1
K. Markantonakis and R. N. Akram, Multi-Application Smart Card Platforms and Operating Systems. Springer International Publishing, 2017, pp. 59–92. [Online]. Available: https://doi.org/10.1007/978-3-3 19-50500-8_3
S. Skorobogatov, “Teardown and feasibility study of IronKey – the most secure USB Flash drive,” 2021. [Online]. Available: https://arxiv.org/abs/2110.14090
GlobalPlatform, “Secure element protection profile,” 2021. [Online]. Available: https://www.commoncriteriaportal.org/files/ppfiles/CCN-CC-PP-5-2021.pdf
P. K. Manadhata and J. M. Wing, “An attack surface metric,” IEEE Transactions on Software Engineering, vol. 37, no. 3, pp. 371–386, 2011.
M. Tunstall, Smart Card Security. Springer International Publishing, 2017, pp. 217–251. [Online]. Available: https://doi.org/10.1007/978-3 -319-50500-8_9
T. Roche, “EUCLEAK,” Cryptology ePrint Archive, Paper 2024/1380, 2024. [Online]. Available: https://eprint.iacr.org/2024/1380
G. Alendal, S. Axelsson, and G. O. Dyrkolbotn, “Chip chop — smashing the mobile phone secure chip for fun and digital forensics,” Forensic Science International: Digital Investigation, vol. 37, p. 301191, 2021.
Samsung eSE SDK. [Online]. Available: https://developer.samsung.com/ese/overview.html
Developers can soon offer in-app NFC transactions using the secure element. [Online]. Available: https://nr.apple.com/dN9S3v5Wt1 ¨
G. M. Garrido, J. Sedlmeir, O. Uludağ, I. S. Alaoui, A. Luckow, and F. Matthes, “Revealing the landscape of privacy-enhancing technologies in the context of data markets for the IoT: A systematic literature review,” Journal of Network and Computer Applications, vol. 207, p. 103465, 2022.
M. Sabt, M. Achemlal, and A. Bouabdallah, “Trusted execution environment: What it is, and what it is not,” in International Conference on Trust, Security and Privacy in Computing and Communications. IEEE, 2015.
GlobalPlatform, “Introduction to trusted execution environments,” 2018. [Online]. Available: https://globalplatform.wpengine.com/resource-publication/introduction-to-trusted-execution-environments/
J. Ménétrey, C. Göttel, A. Khurshid, M. Pasin, P. Felber, V. Schiavoni, and S. Raza, “Attestation mechanisms for trusted execution environments demystified,” in Distributed Applications and Interoperable Systems, D. Eyers and S. Voulgaris, Eds. Springer International Publishing, 2022, pp. 95–113.
S. Cen and B. Zhang, “Trusted time and monotonic counters with Intel® Software Guard Extensions Platform Services,” 2017. [Online]. Available: https://cdrdv2-public.intel.com/671564/intel-sgx-platform-services.pdf
M. Schneider, R. J. Masti, S. Shinde, S. Capkun, and R. Perez, “SoK: Hardware-supported trusted execution environments,” May 2022.
A. Muñoz, R. Ríos, R. Román, and J. López, “A survey on the (in)security of trusted execution environments,” Computers & Security, vol. 129, p. 103180, 2023.
D. Chaum, “Blind signatures for untraceable payments,” in Advances in Cryptology, D. Chaum, R. L. Rivest, and A. T. Sherman, Eds. Boston, MA: Springer US, 1983, pp. 199–203.
——, “Privacy protected payments: Unconditional payer and/or payee untraceability,” in Smart Card 2000: Second International Smart Card 2000 Conference. New York, NY: Elsevier Science, 1989, pp. 69–93.
D. Chaum, A. Fiat, and M. Naor, “Untraceable electronic cash,” in Advances in Cryptology — CRYPTO’ 88, S. Goldwasser, Ed. New York, NY: Springer New York, 1990, pp. 319–327.
S. Goldwasser, S. Micali, and C. Rackoff, “The knowledge complexity of interactive proof systems,” SIAM Journal on Computing, vol. 18, no. 1, pp. 186–208, 1989.
M. Babel and J. Sedlmeir, “Bringing data minimization to digital wallets at scale with general-purpose zero-knowledge proofs,” 2023. [Online]. Available: https://arxiv.org/abs/2301.00823
N. Bitansky, R. Canetti, A. Chiesa, and E. Tromer, “From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again,” in Proceedings of the 3rd Innovations in Theoretical Computer Science Conference. ACM, 2012, pp. 326–349.
P. L. Barreto and G. H. Zanon, “Blind signatures from zero-knowledge arguments,” Cryptology ePrint Archive, Paper 2023/067, 2023. [Online]. Available: https://eprint.iacr.org/2023/067
S. Chaliasos, J. Ernstberger, D. Theodore, D. Wong, M. Jahanara, and B. Livshits, “SoK: What don’t we know? Understanding security vulnerabilities in SNARKs,” 2024. [Online]. Available: https://arxiv.org/abs/2402.15293
F. Tramèr, D. Boneh, and K. Paterson, “Remote Side-Channel attacks on anonymous transactions,” in 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, Aug. 2020, pp. 2739–2756. [Online]. Available: https://www.usenix.org/conference/usenixsecurity20/presentation/tramer
E. Ben-Sasson, I. Bentov, Y. Horesh, and M. Riabzev, “Scalable zero knowledge with no trusted setup,” in Advances in Cryptology – CRYPTO 2019, A. Boldyreva and D. Micciancio, Eds. Springer International Publishing, 2019, pp. 701–732.
D. Boneh and V. Shoup, A Graduate Course in Applied Cryptography, Jan. 2023. [Online]. Available: https://toc.cryptobook.us/
A. Ozdemir and D. Boneh, “Experimenting with collaborative zk-SNARKs: Zero-Knowledge proofs for distributed secrets,” in 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Aug. 2022, pp. 4291–4308. [Online]. Available: https://www.usenix.org/conference/usenixsecurity22/presentation/ozdemir
N. P. Smart, “Practical and efficient FHE-based MPC,” in 19th IMA International Conference on Cryptography and Coding, Dec. 2023, pp. 263–283.
T. Barbereau, E. Ermolaev, M. Brennecke, E. Hartwich, and J. Sedlmeir, “Beyond a fistful of tumblers: Toward a taxonomy of Ethereum-based mixers,” in Proceedings of the 44th International Conference on System Sciences. AIS, 2023. [Online]. Available: https://aisel.aisnet.org/icis2023/cyber_security/cyber_security/13/
K. Wüst, K. Kostiainen, N. Delius, and S. Capkun, “Platypus: A central bank digital currency with unlinkable transactions and privacy-preserving regulation,” in Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, 2022, pp. 2947–2960.
M. B. van Egmond, V. Dunning, S. van den Berg, T. Rooijakkers, A. Sangers, T. Poppe, and J. Veldsink, “Privacy-preserving anti-money laundering using secure multi-party computation,” Cryptology ePrint Archive, Paper 2024/065, May 2024. [Online]. Available: https://eprint.iacr.org/2024/065/20240530:123039
T. Barbereau, L. Weigl, and N. Pocher, Financial Regulation, Political Context, and Technology in the European Union. Springer Nature Switzerland, 2024, pp. 19–46. [Online]. Available: https://doi.org/10.1007/978-3-031-66047-4_2
“Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95/46/EC (General Data Protection Regulation),” https://eur-lex.europa.eu/eli/reg/2016/679/oj, Official Journal of the European Union, L 119, 4 May 2016, pp. 1-88.
K. P. Murphy, T. Sun, Y. S. Zhou, N. Tsuda, N. Zhang, V. Budau, F. Solomon, K. Kao, M. Vucinic, and K. Miggiani, “Central bank digital currency data use and privacy protection,” International Monetary Fund, Tech. Rep. 2024/004, Aug. 2024. [Online]. Available: https://www.imf.org/en/Publications/fintech-notes/Issues/2024/08/30/Central -Bank-Digital-Currency-Data-Use-and-Privacy-Protection-554103
B. Brodsky, A. Dubey, and D. Tercero Lucas, “Enabling offline payments in an online world. Privacy considerations,” 2023. [Online]. Available: https://www.lipisadvisors.com/whitepapers
R. Lamberty, D. Kirste, N. Kannengießer, and A. Sunyaev, “HybCBDC: A design for central bank digital currency systems enabling digital cash,” IEEE Access, vol. 12, pp. 137 712–137 728, 2024.
M. Riccardi and M. Levi, “Cash, crime and anti-money laundering,” in The Handbook of Criminal and Terrorism Financing Law. Palgrave Macmillan, 2018.
N. Pocher, M. Zichichi, F. Merizzi, M. Z. Shafiq, and S. Ferretti, “Detecting anomalous cryptocurrency transactions: An AML/CFT application of machine learning-based forensics,” Electronic Markets, vol. 33, no. 1, 2023.
Financial Action Task Force (FATF), “International standards on combating money laundering and the financing of terrorism & proliferation: The FATF recommendations,” 2012. [Online]. Available: https://www.fatf-gafi.org/content/dam/fatf-gafi/recommendations/FATF%20Recommendations%202012.pdf
“Regulation (EU) 2024/1624 of the European Parliament and of the Council of 31 May 2024 on the prevention of the use of the financial system for the purposes of money laundering or terrorist financing,” https://data.europa.eu/eli/reg/2024/1624/oj, Official Journal of the European Union, L series, 19 June 2024.
G. P. Hancke, “Distance-bounding for RFID: Effectiveness of ‘terrorist fraud’ in the presence of bit errors,” in International Conference on RFID-Technologies and Applications, 2012, pp. 91–96.
A. Ranganathan and S. Capkun, “Are we really close? Verifying proximity in wireless systems,” IEEE Security & Privacy, vol. 15, no. 3, pp. 52–58, 2017.
B. Brodsky, A. Dubey, and D. Tercero Lucas, “Enabling offline payments in an online world. Scalability,” 2023. [Online]. Available: https://www.lipisadvisors.com/whitepapers
B. Brodsky, A. Dubey, and D. Tercero Lucas, “Enabling offline payments in an online world. Interoperability,” 2023. [Online]. Available: https://www.lipisadvisors.com/whitepapers
A. Poller, U. Waldmann, S. Vowé, and S. Türpe, “Electronic identity cards for user authentication – promise and practice,” IEEE Security & Privacy, vol. 10, no. 1, pp. 46–54, 2012.
Sveriges Riksbank, “E-krona pilot Phase 4,” Mar. 2024. [Online]. Available: https://www.riksbank.se/globalassets/media/rapporter/e-krona/2024/e-krona-pilot-phase-4.pdf
V. Schlatt, J. Sedlmeir, S. Feulner, and N. Urbach, “Designing a framework for digital KYC processes built on blockchain-based self-sovereign identity,” Information & Management, vol. 59, 2022.
S. Tosza, “Enforcement of international sanctions as the third pillar of the anti-money laundering framework. An unannounced effect of the AML reform and the Sanctions Directive,” New Journal of European Criminal Law, vol. 15, no. 3, pp. 336–356, aug 2024.
G. Powers, “Reconsidering economic sanctions,” in Soft War, M. L. Gross and T. Meisels, Eds. Cambridge University Press, 2016, pp. 151–174. [Online]. Available: https://www.cambridge.org/core/books/soft-war/reconsidering-economic-sanctions
L. de Lima and E. M. Salinas, “Retail central bank digital currency: From vision to design,” 2022. [Online]. Available: https://www.oliverwymanforum.com/content/dam/oliver-wyman/ow-forum/future-of-mon ey/Retail-Central-Bank-Digital-Currency-From-Vision-to-Design.pdf
E. Rennie and S. Steele, “Privacy and emergency payments in a pandemic: How to think about privacy and a central bank digital currency,” Law, Technology and Humans, vol. 3, no. 1, pp. 6–17, 2021.
J. Kokott and C. Sobotta, “The distinction between privacy and data protection in the jurisprudence of the CJEU and the ECtHR,” International Data Privacy Law, vol. 3, no. 4, pp. 222–228, Nov. 2013. [Online]. Available: https://doi.org/10.1093/idpl/ipt017
C. Nyst and T. Falchetta, “The right to privacy in the digital age,” Journal of Human Rights Practice, vol. 9, pp. 104–118, 2017.
European Data Protection Board and European Data Protection Supervisor, “EDPB-EDPS joint opinion 02/2023 on the proposal for a regulation on establishing the digital euro,” Feb. 2023. [Online]. Available: https://www.edps.europa.eu/system/files/2023-10/edpb_edps_jointopinion_digitaleuro_en_0.pdf
P. Casanovas, J. González-Conejero, and L. De Koker, “Legal compliance by design (LCbD) and through design (LCtD): Preliminary survey,” CEUR Workshop Proceedings, vol. 2049, pp. 33–49, 2018.
A. Cavoukian, “Privacy by design,” Office of Information and Privacy Communication, 2011.
K. Yeung, “‘Hypernudge’: Big Data as a mode of regulation by design,” Information, Commumcation & Society, vol. 20, no. 1, pp. 118–136, 2017.
T. W. House, “Technical design choices for a U.S. CBDC system,” 2022. [Online]. Available: https://www.whitehouse.gov/wp-content/uploads/2022/09/09-2022-Technical-Design-Choices-US-CBDC-System.pdf
R. Anderson, J. Spring, R. Clayton, and A. Hutchings, “Taking the crime out of cybercrime: Theory and policy implications,” Journal of Cybersecurity, vol. 7, no. 1, p. tyab004, 2021. [Online]. Available: https://academic.oup.com/cybersecurity/article/7/1/tyab004/6166133
B. Custers, J.-J. Oerlemans, and R. Pool, “Laundering the profits of ransomware: Money laundering methods for vouchers and cryptocurrencies,” European Journal of Crime, Criminal Law and Criminal Justice, vol. 28, no. 2, pp. 121–152, 2020.
S. Feulner, J. Sedlmeir, V. Schlatt, and N. Urbach, “Exploring the use of self-sovereign identity for event ticketing systems,” Electronic Markets, vol. 32, pp. 1759–1777, 2022.
F. Effendi and A. Chattopadhyay, “Privacy-preserving graph-based machine learning with fully homomorphic encryption for collaborative anti-money laundering,” in Security, Privacy, and Applied Cryptography Engineering, J. Knechtel, U. Chatterjee, and D. Forte, Eds. Springer Nature Switzerland, 2025, pp. 80–105.