Projects per year
Abstract / Description of output
Email communication is amongst the most prominent online activities, and as such, can put sensitive information at risk. It is thus of high importance that internet email applications are designed in a privacy-aware manner and analyzed under a rigorous threat model. The Snowden revelations (2013) suggest that such a model should feature a global adversary, in light of the observational tools available. Furthermore, the fact that protecting metadata can be of equal importance as protecting the communication context implies that end-to-end encryption may be necessary, but it is not sufficient.
With this in mind, we utilize the Universal Composability framework [Canetti, 2001] to introduce an expressive cryptographic model for email “ecosystems” that can formally and precisely capture various well-known privacy notions (unobservability, anonymity, unlinkability, etc.), by parameterizing the amount of leakage an ideal-world adversary (simulator) obtains from the email functionality.
Equipped with our framework, we present and analyze the security of two email constructions that follow different directions in terms of the efficiency vs. privacy tradeoff. The first one achieves optimal security (only the online/offline mode of the users is leaked), but it is mainly of theoretical interest; the second one is based on parallel mixing [Golle and Juels, 2004] and is more practical, while it achieves anonymity with respect to users that have similar amount of sending and receiving activity.
With this in mind, we utilize the Universal Composability framework [Canetti, 2001] to introduce an expressive cryptographic model for email “ecosystems” that can formally and precisely capture various well-known privacy notions (unobservability, anonymity, unlinkability, etc.), by parameterizing the amount of leakage an ideal-world adversary (simulator) obtains from the email functionality.
Equipped with our framework, we present and analyze the security of two email constructions that follow different directions in terms of the efficiency vs. privacy tradeoff. The first one achieves optimal security (only the online/offline mode of the users is leaked), but it is mainly of theoretical interest; the second one is based on parallel mixing [Golle and Juels, 2004] and is more practical, while it achieves anonymity with respect to users that have similar amount of sending and receiving activity.
Original language | English |
---|---|
Title of host publication | Advances in Cryptology – ASIACRYPT 2018 |
Subtitle of host publication | 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part III |
Place of Publication | Brisbane, Australia |
Publisher | Springer, Cham |
Pages | 191-221 |
Number of pages | 31 |
ISBN (Electronic) | 978-3-030-03332-3 |
ISBN (Print) | 978-3-030-03331-6 |
DOIs | |
Publication status | Published - 26 Oct 2018 |
Event | 24th Annual International Conference on the Theory and Application of Cryptology and Information Security - Brisbane, Australia Duration: 2 Dec 2018 → 6 Dec 2018 https://asiacrypt.iacr.org/2018/ |
Publication series
Name | Lecture Notes in Computer Science |
---|---|
Publisher | Springer, Cham |
Volume | 11274 |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Name | Security and Cryptology |
---|---|
Volume | 11274 |
Conference
Conference | 24th Annual International Conference on the Theory and Application of Cryptology and Information Security |
---|---|
Abbreviated title | ASIACRYPT 2018 |
Country/Territory | Australia |
City | Brisbane |
Period | 2/12/18 → 6/12/18 |
Internet address |
Fingerprint
Dive into the research topics of 'A Universally Composable Framework for the Privacy of Email Ecosystems'. Together they form a unique fingerprint.Projects
- 1 Finished
-
Panoramix:Privacy and Accountability in Networks via Optimized Randomized Mix-nets
1/09/15 → 31/01/19
Project: Research