How to subvert backdoored encryption: Security against adversaries that decrypt all ciphertexts

© Thibaut Horel, Sunoo Park, Silas Richelson, and Vinod Vaikuntanathan. In this work, we examine the feasibility of secure and undetectable point-to-point communication when an adversary (e.g., a government) can read all encrypted communications of surveillance targets. We consider a model where the...

Full description

Bibliographic Details
Format: Article
Language:English
Published: 2021-11-04T15:13:48Z.
Subjects:
Online Access:Get fulltext