Multiple Objectives of Lawful-Surveillance Protocols (Transcript of Discussion)

@inproceedings{Feigenbaum2017MultipleOO,
  title={Multiple Objectives of Lawful-Surveillance Protocols (Transcript of Discussion)},
  author={Joan Feigenbaum},
  booktitle={Security Protocols Workshop},
  year={2017}
}
  • J. Feigenbaum
  • Published in Security Protocols Workshop 20 March 2017
  • Education
It’s great to be back in Cambridge. I want to talk about the supposedly competing objectives of personal privacy and national security. More generally, I’m interested in the alleged tension between proper handling of sensitive data and pursuit of criminals and terrorists. Many people claim that these are irreconcilable objectives, but I don’t believe that they necessarily are. The topic fits into this year’s SPW theme of multiple-objective security. Let me take you back to three years ago, when… 

Design Choices for Central Bank Digital Currency: Policy and Technical Considerations

TLDR
This paper enumerates the fundamental technical design challenges facing CBDC designers, with a particular focus on performance, privacy, and security, and presents a vision of the rich range of functionalities and use cases that a well-designed CBDC platform could ultimately offer users.

CALYPSO: Private Data Management for Decentralized Ledgers

TLDR
This work enhances permissioned and permissionless blockchains with the ability to manage confidential data without forfeiting availability or decentralization and introduces on-chain secrets, a novel abstraction that enforces atomic deposition of an auditable trace whenever users access confidential data.

Brick: Asynchronous State Channels

TLDR
Brick is introduced, the first off-chain construction that remains secure under full asynchrony and an off- chain construction that can provide auditability on top of Brick without conflicting with its privacy guarantees, and the permissioned model of blockchains is considered.

Brick: Asynchronous Payment Channels.

TLDR
Brick is introduced, the first off-chain construction that remains secure under network asynchrony and concurrently provides correct incentives, and Brick+, an off- chain construction that provides auditability on top of Brick without conflicting with its privacy guarantees.

CALYPSO: Private Data Management for Decentralized Ledgers (Extended Version)

TLDR
This work enhances permissioned and permissionless blockchains with the ability to manage confidential data without forfeiting availability or decentralization and proposes on-chain secrets, a novel abstraction that enforces atomic deposition of an auditable trace whenever users access confidential data.

Secure, Confidential Blockchains Providing High Throughput and Low Latency

TLDR
This thesis presents OMNILEDGER, a novel scale-out distributed ledger that preserves long-term security under permissionless operation, and CALYPSO, the first fully decentralized auditable access-control framework for secure blockchain-based data sharing which builds upon two abstractions.

Data Protection Law and Multi-Party Computation: Applications to Information Exchange between Law Enforcement Agencies

Pushes for increased power of Law Enforcement (LE) for data retention and centralized storage result in legal challenges with data protection law and courts—and possible violations of the right to

Verifiable Management of Private Data under Byzantine Failures

TLDR
Cypso is an auditable data-management framework that lends itself to decentralize the sharing and life-cycle management of private data as well as to enforce fair, atomic disclosure of data protecting against front-running attacks.

References

SHOWING 1-10 OF 43 REFERENCES

Mathematical Models of Computer Security

TLDR
This chapter presents a process algebraic approach to the modelling of security properties and policies, and presents a formulation of noninterference, along with some more operational presentations of process algebra, including the idea of bi-simulation.

Full Disk Encryption: Bridging Theory and Practice

TLDR
This work revisits the problem of Full Disk Encryption (FDE), and introduces the notion of a diversifier, which does not require additional storage, but allows the plaintext of a particular sector to be encrypted to different ciphertexts.

DECIM: Detecting Endpoint Compromise In Messaging

TLDR
DECIM manages and refreshes encryption/decryption keys in an automatic and transparent way and makes it necessary for uses of the key to be inserted in an append-only log, which the device owner can interrogate in order to detect misuse.

A Systematic Assessment of the Security of Full Disk Encryption

TLDR
It is shown that neither software- nor hardware-based FDE provides perfect security, nor is one clearly superior to the other, regarding physical access threats.

Identity-Based Cryptosystems and Signature Schemes

  • A. Shamir
  • Computer Science, Mathematics
    CRYPTO
  • 1984
TLDR
A novel type of cryptographic scheme, which enables any pair of users to communicate securely and to verify each other’s signatures without exchanging private or public keys, without keeping key directories, and without using the services of a third party.

Secure Communications over Insecure Channels Based on Short Authenticated Strings

TLDR
A way to establish peer-to-peer authenticated communications over an insecure channel by using an extra channel which can authenticate very short strings, e.g. 15 bits, which offers an alternative (or complement) to public-key infrastructures, since it no longer need any central authority, and to password-based authenticated key exchange, since one no longer needs to establish a confidential password.

Disk encryption: do we need to preserve length?

TLDR
The possibility of the use of encryption schemes where length expansion is produced for the purpose of disk encryption is analyzed and it is demonstrated that deterministic authenticated encryption (DAE) schemes may have more advantages than disadvantages compared to a TES when used for disk encryption.

An Empirical Study of Namecoin and Lessons for Decentralized Namespace Design

TLDR
This work proposes a model of utility of different names to different participants, and articulate desiderata of a decentralized namespace in terms of this utility function, and uses this model to explore the design space of mechanisms and analyze the trade-offs.

Bitcoin: A Peer-to-Peer Electronic Cash System

TLDR
This work proposes a solution to the double-spending problem using a peer-to-peer network, where the network timestamps transactions by hashing them into an ongoing chain of hash-based proof-of-work, forming a record that cannot be changed without redoing the proof- of-work.

PoliCert: Secure and Flexible TLS Certificate Management

TLDR
PoliCert is proposed, a comprehensive log-based and domain-oriented architecture that enhances the security of PKI by offering: a) stronger authentication of a domain's public keys, b) comprehensive and clean mechanisms for certificate management, and c) an incentivised incremental deployment plan.