Reducing Metadata Leakage from Encrypted Files and Communication with PURBs

@article{Nikitin2019ReducingML,
  title={Reducing Metadata Leakage from Encrypted Files and Communication with PURBs},
  author={K. Nikitin and Ludovic Barman and M. Underwood and B. Ford},
  journal={Proceedings on Privacy Enhancing Technologies},
  year={2019},
  volume={2019},
  pages={33 - 6}
}
  • K. Nikitin, Ludovic Barman, +1 author B. Ford
  • Published 2019
  • Computer Science
  • Proceedings on Privacy Enhancing Technologies
  • Abstract Most encrypted data formats leak metadata via their plaintext headers, such as format version, encryption schemes used, number of recipients who can decrypt the data, and even the recipients’ identities. This leakage can pose security and privacy risks to users, e.g., by revealing the full membership of a group of collaborators from a single encrypted e-mail, or by enabling an eavesdropper to fingerprint the precise encryption software version and configuration the sender used. We… CONTINUE READING
    3 Citations
    2FE: Two-Factor Encryption for Cloud Storage
    • PDF
    SoK: why Johnny can't fix PGP standardization
    • PDF
    Deniable Upload and Download via Passive Participation
    • PDF

    References

    SHOWING 1-10 OF 86 REFERENCES
    Key-Privacy in Public-Key Encryption
    • 414
    • PDF
    Privacy in Encrypted Content Distribution Using Private Broadcast Encryption
    • 127
    • Highly Influential
    • PDF
    Nonce-Based Symmetric Encryption
    • 207
    • PDF
    Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm
    • 883
    • PDF
    Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts
    • 68
    • PDF
    Compression and Information Leakage of Plaintext
    • 80
    • PDF
    Defective Sign & Encrypt in S/MIME, PKCS#7, MOSS, PEM, PGP, and XML
    • Don Davis
    • Computer Science
    • USENIX Annual Technical Conference, General Track
    • 2001
    • 51
    • PDF
    Multi-Recipient Encryption Schemes : Efficient Constructions and their Security
    • M. B ELLARE, A. B OLDYREVA, K. K UROSAWA, J. S TADDON
    • 2007
    • 11
    • Highly Influential
    • PDF