Partitioned Private User Storages in End-to-End Encrypted Online Social Networks

10/08/2020
by   Fabian Schillinger, et al.
0

In secure Online Social Networks (OSN), often end-to-end encryption approaches are used. This ensures the privacy of communication between the participants. To manage, store, or transfer the cryptographic keys from one device to another one, encrypted private storages can be used. To gain access to such storages, login credentials, only known to the user, are needed. Losing these credentials results in a permanent loss of cryptographic keys and messages because the storage is encrypted. We present a scheme to split encrypted user storages into multiple storages. Each one can be reconstructed with the help of other participants of the OSN. The more of the storages can be reconstructed, the higher the chance of successfully reconstructing the complete private storage is. Therefore, regaining possession of the cryptographic keys used for communication is increased. We achieve high rates of successful reconstructions, even if a large fraction of the distributed shares are not accessible anymore because the shareholders are inactive or malicious.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/08/2020

Concealed Communication in Online Social Networks

Online social networks are used frequently by many people: Staying in co...
research
07/17/2020

Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: An Extended Survey

New cryptographic techniques such as homomorphic encryption (HE) allow c...
research
10/08/2020

A Proxy-Based Encrypted Online Social Network With Fine-Grained Access

When using Online Social Networks, users often share information with di...
research
07/18/2022

Wink: Deniable Secure Messaging

End-to-end encrypted (E2EE) messaging is an essential first step towards...
research
10/09/2021

A Multiple Snapshot Attack on Deniable Storage Systems

While disk encryption is suitable for use in most situations where confi...
research
09/29/2022

Hidden in Plain Sight: Exploring Encrypted Channels in Android apps

As privacy features in Android operating system improve, privacy-invasiv...
research
09/09/2021

Fighting Fake News in Encrypted Messaging with the Fuzzy Anonymous Complaint Tally System (FACTS)

Recent years have seen a strong uptick in both the prevalence and real-w...

Please sign up or login with your details

Forgot password? Click here to reset