“…There are by now millions of users using the Tor network [27,28] to break the link between their identities and their messages/packets. As the solutions like Tor network suffer from traffic analysis attacks [11,31,38], anonymous communication becomes an active research area and many works [1,3,29,42,43,47,52,53] aim at providing anonymous communication services efficiently. This work explores the solutions of anonymous communication with the help of secure multi-party computation (MPC).…”