2019
DOI: 10.1007/978-3-030-26954-8_8
|View full text |Cite
|
Sign up to set email alerts
|

Asymmetric Message Franking: Content Moderation for Metadata-Private End-to-End Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(12 citation statements)
references
References 50 publications
0
12
0
Order By: Relevance
“…These two properties together also ensure that no one can impersonate a sender to the receiver [359].…”
Section: Transparency Methods In the Literaturementioning
confidence: 99%
See 2 more Smart Citations
“…These two properties together also ensure that no one can impersonate a sender to the receiver [359].…”
Section: Transparency Methods In the Literaturementioning
confidence: 99%
“…This cryptographically ensures that receivers cannot report to the moderator messages that are "forged" to appear as if they were from the sender; the moderator cannot be convinced any party sent a message they did not send. These schemes have two key accountability properties [151,359]:…”
Section: Transparency Methods In the Literaturementioning
confidence: 99%
See 1 more Smart Citation
“…Tyagi, Grubbs, Len, Miers, and Ristenpart [23] intro-duced asymmetric message franking to achieve content moderation under the condition that the sender and receiver identities are hidden from the service providers. They provided a construction of an asymmetric message franking scheme using an applied technique of a designated verifier signature scheme.…”
Section: Related Workmentioning
confidence: 99%
“…Message Franking: The most common approach today for reporting malicious messages in encrypted messaging systems is message franking [11], [21], [38]. Message franking allows a recipient to prove the identity of the sender of a malicious message.…”
Section: Related Workmentioning
confidence: 99%