2022
DOI: 10.2478/popets-2022-0039
|View full text |Cite
|
Sign up to set email alerts
|

SoK: Plausibly Deniable Storage

Abstract: Data privacy is critical in instilling trust and empowering the societal pacts of modern technology-driven democracies. Unfortunately it is under continuous attack by overreaching or outright oppressive governments, including some of the world’s oldest democracies. Increasingly-intrusive anti-encryption laws severely limit the ability of standard encryption to protect privacy. New defense mechanisms are needed. Plausible deniability (PD) is a powerful property, enabling users to hide the existen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 36 publications
0
2
0
Order By: Relevance
“…Our security definition does not account for adversaries profiling the access patterns of a user, which calls for additional techniques to either randomize or ''equalize'' all access sequences. Future work will thus investigate extensions to our scheme by means of private information retrieval or other techniques (see the related work, in particular [22]), to analyze if information-theoretic security remains accomplishable or deteriorates against attackers that profile the (physical) device usage.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Our security definition does not account for adversaries profiling the access patterns of a user, which calls for additional techniques to either randomize or ''equalize'' all access sequences. Future work will thus investigate extensions to our scheme by means of private information retrieval or other techniques (see the related work, in particular [22]), to analyze if information-theoretic security remains accomplishable or deteriorates against attackers that profile the (physical) device usage.…”
Section: Discussionmentioning
confidence: 99%
“…An interesting additional security consideration is resilience against leakage of information from access patterns. In a series of papers [20], [21], [22], the focus of VOLUME 11, 2023 plausible deniability constructions was shifted to hiding access patterns, as well as leveraging properties of the physical storage devices, using oblivious RAM among other techniques. Our discussion is agnostic of such physical features and does not hide access patterns as such, since the adversary model used here is only concerned with attacks on a static snapshot of the ciphertext, but allows partial side-information to be available to the adversary (similar as what access patterns could leak).…”
Section: Related Workmentioning
confidence: 99%