Privacy protocols

04/11/2019
by   Jason Castiglione, et al.
0

Security protocols enable secure communication over insecure channels. Privacy protocols enable private interactions over secure channels. Security protocols set up secure channels using cryptographic primitives. Privacy protocols set up private channels using secure channels. But just like some security protocols can be broken without breaking the underlying cryptography, some privacy protocols can be broken without breaking the underlying security. Such privacy attacks have been used to leverage e-commerce against targeted advertising from the outset; but their depth and scope became apparent only with the overwhelming advent of influence campaigns in politics. The blurred boundaries between privacy protocols and privacy attacks present a new challenge for protocol analysis. Covert channels turn out to be concealed not only below overt channels, but also above: subversions, and the level-below attacks are supplemented by sublimations and the level-above attacks.

READ FULL TEXT
research
07/28/2023

Provably secure KEM-based protocols over unauthenticated channels

In this paper we propose a number of KEM-based protocols to establish a ...
research
04/08/2020

Improved Secure Efficient Delegated Private Set Intersection

Private Set Intersection (PSI) is a vital cryptographic technique used f...
research
12/13/2018

Security and Privacy Implications of Middlebox Cooperation Protocols

This white paper presents an analysis done by the MAMI project of the pr...
research
07/05/2022

Challenges in Adapting ECH in TLS for Privacy Enhancement over the Internet

Security and Privacy are crucial in modern Internet services. Transport ...
research
01/13/2021

Secure Process Algebra

Based on our previous work on truly concurrent process algebras APTC, we...
research
10/18/2019

Universal Composability is Secure Compilation

Universal composability is a framework for the specification and analysi...
research
10/07/2020

Privacy and Data Balkanization: Circumventing the Barriers

The rapid growth in digital data forms the basis for a wide range of new...

Please sign up or login with your details

Forgot password? Click here to reset