Abstract
Abstract
Most encrypted data formats leak metadata via their plaintext headers, such as format version, encryption schemes used, number of recipients who can decrypt the data, and even the recipients’ identities. This leakage can pose security and privacy risks to users, e.g., by revealing the full membership of a group of collaborators from a single encrypted e-mail, or by enabling an eavesdropper to fingerprint the precise encryption software version and configuration the sender used.
We propose that future encrypted data formats improve security and privacy hygiene by producing Padded Uniform Random Blobs or PURBs: ciphertexts indistinguishable from random bit strings to anyone without a decryption key. A PURB’s content leaks nothing at all, even the application that created it, and is padded such that even its length leaks as little as possible.
Encoding and decoding ciphertexts with no cleartext markers presents efficiency challenges, however. We present cryptographically agile encodings enabling legitimate recipients to decrypt a PURB efficiently, even when encrypted for any number of recipients’ public keys and/or passwords, and when these public keys are from different cryptographic suites. PURBs employ Padmé, a novel padding scheme that limits information leakage via ciphertexts of maximum length M to a practical optimum of O(log log M) bits, comparable to padding to a power of two, but with lower overhead of at most 12% and decreasing with larger payloads.
Reference64 articles.
1. [1] Ring-road: Leaking sensitive data in security protocols. http://www.ringroadbug.com/.
2. [2] Michel Abdalla, Mihir Bellare, and Phillip Rogaway. The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES. In Cryptographers’ Track at the RSA Conference, pages 143–158, 2001.
3. [3] Diego F Aranha, Pierre-Alain Fouque, Chen Qian, Mehdi Tibouchi, and Jean-Christophe Zapalowicz. Binary Elligator Squared. In International Workshop on Selected Areas in Cryptography, pages 20–37, 2014.
4. [4] Adam Barth, Dan Boneh, and Brent Waters. Privacy in Encrypted Content Distribution Using Private Broadcast Encryption. In International Conference on Financial Cryptography and Data Security, pages 52–64, 2006.
5. [5] Tal Be’ery and Amichai Shulman. A Perfect CRIME? Only TIME Will Tell. Black Hat Europe, 2013.
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Optimally Hiding Object Sizes with Constrained Padding;2023 IEEE 36th Computer Security Foundations Symposium (CSF);2023-07
2. Flash Freezing Flash Boys: Countering Blockchain Front-Running;2022 IEEE 42nd International Conference on Distributed Computing Systems Workshops (ICDCSW);2022-07
3. Federated Learning Framework with Straggling Mitigation and Privacy-Awareness for AI-based Mobile Application Services;IEEE Transactions on Mobile Computing;2022
4. The Computer for the 21st Century – Second Edition for Europe;Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems;2021-05-08
5. SoK;Proceedings of the 15th International Conference on Availability, Reliability and Security;2020-08-25