How to subvert backdoored encryption: Security against adversaries that decrypt all ciphertexts
© Thibaut Horel, Sunoo Park, Silas Richelson, and Vinod Vaikuntanathan. In this work, we examine the feasibility of secure and undetectable point-to-point communication when an adversary (e.g., a government) can read all encrypted communications of surveillance targets. We consider a model where the...
Format: | Article |
---|---|
Language: | English |
Published: |
2021-11-04T15:13:48Z.
|
Subjects: | |
Online Access: | Get fulltext |