How to (Legally) Keep Secrets from Mobile Operators
نویسندگان
چکیده
Secure-channel establishment allows two endpoints to communicate confidentially and authentically. Since they hide all data sent across them, good or bad, secure channels are often subject mass surveillance in the name of (inter)national security. Some protocols constructed allow easy interception . Others designed preserve privacy either subverted prohibited use without trapdoors.
منابع مشابه
Quantum fingerprints that keep secrets
We introduce a new type of cryptographic primitive that we call hiding fingerprinting. A (quantum) fingerprinting scheme translates a binary string of length n to d (qu)bits, typically d ≪ n, such that given any string y and a fingerprint of x, one can decide with high accuracy whether x = y. Classical fingerprinting schemes cannot hide information very well: a classical fingerprint of x that g...
متن کاملLockbox: Helping Computers Keep Your Secrets
The realization that modern architectures lack sufficient security features is not a new one. Many grand visions of “trusted computing” remain unfilled. After millions of dollars of research money, huge expenditures on the part of industry and rarely seen levels of cooperation between hardware vendors, users remain without substantial security features in their systems. Those features that do e...
متن کاملHow to Store some Secrets
This paper introduces a special type of symmetric cryptosystem called multi-encryption scheme. It allows users to encrypt multiple plaintexts into a single ciphertext. Each plaintext is protected with its own secret key, meaning that they can be decrypted individually by applying the decryption function with the corresponding key to the ciphertext. Compared to encrypting the ciphertexts one-by-...
متن کاملHow to share secrets simultaneously
Each member of a team consisting of n person has a secret. The k out of n simultaneous threshold secret sharing requires that any group of k members should be able to recover the secret of the other n−k members, while any group of k − 1 or less members should have no information on the secret of other team members. We show that when all secrets are independent and have size s then each team mem...
متن کاملHonest Databases That Can Keep Secrets
Polyinstantiation has generated a great deal of controversy lately. Some have argued that polyinstantiation and integrity are fundamentally incompatible, and have proposed alternatives to polyinstantiation. Others have argued about the correct de nition of polyinstantiation and its operational semantics. In this paper we provide a fresh analysis of the basic problem that we are trying to solve,...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Lecture Notes in Computer Science
سال: 2021
ISSN: ['1611-3349', '0302-9743']
DOI: https://doi.org/10.1007/978-3-030-88418-5_2