Express: Lowering the Cost of Metadata-hiding Communication with Cryptographic Privacy

Saba Eskandarian, Henry Corrigan-Gibbs, Matei Zaharia, Don Boneh

References


1.

We Kill People Based on Metadata.

2.

Riposte: An Anonymous Messaging System Handling Millions of Users.

3.

Dawn Xiaodong Song, and Ke Yang. Private keyword-based push and pull with applications to anonymous communicationACNS.

4.

Riposte: An Anonymous Messaging System Handling Millions of Users.

7.

NSA collecting phone records of millions of Verizon customers daily.

8.

Protecting Journalism Sources in the Digital Age.

9.

Times says justice seized reporter's email, phone recordsAP.

10.

Tweetnacl, Js. Tweetnacl.js. https://github.com/dchest/tweetnacl-js..

11.

Ittai Abraham, Benny Pinkas, Avishay Yanai. Blinder: Mpc based scalable and robust anonymous committed broadcastCryptology ePrint Archive. 2020.

12.

Sebastian Angel, Hao Chen, Kim Laine, T V Srinath, Setty. PIR with compressed queries and amortized query processingIEEE Symposium on Security and Privacy, SP. 2018.

13.

Sebastian Angel, T V Srinath, Setty. Unobservable communication over fully untrusted infrastructureOSDI. 2016.

14.

. Anonymous. I am part of the resistance inside the trump administration. 2018.

15.

Anonymous. Whistleblower complaint to us intelligence community inspector general. 2019.

16.

Ap, Gov. t obtains wide ap phone records in probe. 2013.

17.

. Times says justice seized reporter's email, phone recordsAP. 2018.

18.

Michael Backes, Aniket Kate, Praveen Manoharan, Sebastian Meiser, Esfandiar Mohammadi. Anoa: A framework for analyzing anonymous communication protocolsJ. Priv. Confidentiality. 2016.

19.

Charles Berret. Guide to securedrop. 2016.

20.

Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, Yuval Ishai. Zero-knowledge proofs on secret-shared data via fully linear pcpsCRYPTO. 2019.

21.

Dan Boneh, Victor Shoup. A Graduate Course in Applied Cryptography. 2017.

22.

Nikita Borisov, George Danezis, Ian Goldberg. DP5: A private presence servicePoPETs. 2015.

23.

Elette Boyle, Niv Gilboa, Yuval Ishai. Function secret sharingEUROCRYPT. 2015.

24.

Elette Boyle, Niv Gilboa, Yuval Ishai. Function secret sharing: Improvements and extensionsACM CCS. 2016.

25.

David Chaum. Untraceable electronic mail, return addresses, and digital pseudonymsCommun. ACM. 1981.

26.

David Chaum. The dining cryptographers problem: Unconditional sender and recipient untraceabilityJ. Cryptology. 1988.

27.

Weikeng Chen. Weikeng Chen. libdpf. https://github.com/weikengchen/ libdpf, 2018.. 2018.

28.

Raymond Cheng, Will Scott, Bryan Parno, Irene Zhang, Arvind Krishnamurthy, Thomas Anderson. Talek: a Private Publish-Subscribe Protocol. 2016-11.

29.

Benny Chor, Eyal Kushilevitz, Oded Goldreich, Madhu Sudan. Private information retrievalJ. ACM. 1998.

30.

David Cole. We kill people based on metadataNew York Review of Books. 2014.

31.

A David, Kenneth P Cooper, Birman. Preserving privacy in a network of mobile computersIEEE Symposium on Security and Privacy. 1995.

32.

Henry Corrigan, - Gibbs, Dan Boneh. Prio: Private, robust, and scalable computation of aggregate statisticsNSDI. 2017.

33.

Henry Corrigan-Gibbs, Dan Boneh, David Mazières. Riposte: An anonymous messaging system handling millions of usersIEEE Symposium on Security and Privacy. 2015.

34.

Henry Corrigan, - Gibbs, Bryan Ford. Dissent: accountable anonymous group messagingACM CCS. 2010.

35.

Henry Corrigan, - Gibbs, Bryan Ford. Conscript your friends into larger anonymity sets with javascriptProceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, WPES 2013. 2013-11-04.

36.

Henry Corrigan-Gibbs, David Isaac Wolinsky, Bryan Ford. Proactively accountable anonymous messaging in verdictUSENIX Security. 2013.

37.

Cora Currier. Planned nsa reforms still leave journalists reason to worryColumbia Journalism Review. 2014.

38.

Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, Aniket Kate. Anonymity trilemma: Strong anonymity, low bandwidth overhead, low latency -choose twoIEEE Symposium on Security and Privacy, SP. 2018.

39.

Roger Dingledine. One cell is enough to break tor's anonymity. 2009.

40.

Roger Dingledine, Nick Mathewson, Paul F Syverson. Tor: The second-generation onion routerUSENIX Security Symposium. 2004.

41.

Cynthia Dwork. Differential privacyICALP. 2006.

42.

Niv Gilboa, Yuval Ishai. Distributed point functions and their applicationsEUROCRYPT. 2014.

43.

Sharad Goel, Mark Robson, Milo Polte, Emin Gun Sirer. Herbivore: A scalable and efficient protocol for anonymous communication. 2003.

44.

Oded Goldreich, Shafi Goldwasser, Silvio Micali. On the cryptographic applications of random functionsCRYPTO. 1984.

45.

Glenn Greenwald. Nsa collecting phone records of millions of verizon customers daily. The Guardian. 2013.

46.

Amir Houmansadr, Nikita Borisov. The need for flow fingerprints to link correlated network flowsPETS. 2013.

47.

Unobservable communication over fully untrusted infrastructureOSDI.

48.

Aaron Johnson, Chris Wacek, Rob Jansen, Micah Sherr, Paul F Syverson. Users get routed: traffic correlation on tor by realistic adversariesACM CCS. 2013.

49.

Lea Kissner, Alina Oprea, Michael K Reiter. Dawn Xiaodong Song, and Ke Yang. Private keyword-based push and pull with applications to anonymous communicationACNS. 2004.

50.

Lea Kissner, Alina Oprea, Michael K Reiter. Dawn Xiaodong Song, and Ke Yang. Private keyword-based push and pull with applications to anonymous communicationACNS. 2004.

51.

Christiane Kuhn, Martin Beck, Stefan Schiffner, Eduard A Jorswieck, Thorsten Strufe. On privacy notions in anonymous communication. 2019.

52.

Christiane Kuhn, Martin Beck, Thorsten Strufe. Breaking and (partially) fixing provably secure onion routingIEEE Symposium on Security and Privacy. 2020.

53.

Albert Kwon, Henry Corrigan-Gibbs, Srinivas Devadas, Bryan Ford. Atom: Horizontally scaling strong anonymitySOSP. 2017.

54.

Albert Kwon, David Lazar, Srinivas Devadas, Bryan Ford. Riffle: An efficient communication system with strong anonymityPoPETs. 2016.

55.

Albert Kwon, David Lu, Srinivas Devadas. XRD: scalable messaging system with cryptographic privacy. CoRR, abs. 1901.

56.

David Lazar, Yossi Gilad, Nickolai Zeldovich. Karaoke: Distributed private messaging immune to passive traffic analysisOSDI. 2018.

57.

David Lazar, Nickolai Zeldovich. Alpenhorn: Bootstrapping secure communication without leaking metadataOSDI. 2016.

58.

Carlos Aguilar Melchor, Joris Barrier, Laurent Fousse, Marc-Olivier Killijian. XPIR : Private information retrieval for everyonePoPETs. 2016.

59.

Rafail Ostrovsky, Victor Shoup. Private information storage (extended abstract)STOC. 1997.

60.

Ania M Piotrowska, Jamie Hayes, Tariq Elahi, Sebastian Meiser, George Danezis. The loopix anonymity systemUSENIX Security. 2017.

61.

Julie Posetti. Protecting Journalism Sources in the Digital Age. 2017.

62.

Len Sassaman, Bram Cohen, Nick Mathewson. The pynchon gate: a secure method of pseudonymous mail retrievalProceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, WPES 2005. 2005-11-07.

63.

Emily Stark, Michael Hamburg, Dan Boneh. Stanford javascript crypto library. 2009.

64.

Emily Stark, Michael Hamburg, Dan Boneh. Symmetric cryptography in javascriptACSAC. 2009.

65.

Aaron Swartz, Securedrop. Aaron Swartz. Securedrop. https://securedrop.org/, 2013.. 2013.

66.

Nirvan Tyagi, Yossi Gilad, Derek Leung, Matei Zaharia, Nickolai Zeldovich. Stadium: A distributed metadata-private messaging systemSOSP. 2017.

67.

. United Nations High Commissioner for Human Rights. The right to privacy in the digital age. 2018.

68.

Jelle Van Den, David Hooff, Matei Lazar, Nickolai Zaharia, Zeldovich. Vuvuzela: scalable private messaging resistant to traffic analysisSOSP. 2015.

69.

Frank Wang, Catherine Yun, Shafi Goldwasser. Vinod Vaikuntanathan, and Matei Zaharia. 2017.

70.

Frank Wang, Catherine Yun, Shafi Goldwasser, Vinod Vaikuntanathan, Matei Zaharia. Splinter: Practical private queries on public dataNSDI. 2017.

71.

David Isaac Wolinsky, Henry Corrigan-Gibbs, Bryan Ford, Aaron Johnson. Dissent in numbers: Making strong anonymity scaleOSDI. 2012.

72.

United Nations High Commissioner for Human Rights. The right to privacy in the digital age.

73.

Planned NSA reforms still leave journalists reason to worry.

74.

<p>Gov't obtains wide ap phone records in probe</p>.

75.

Tor: The second-generation onion routerUSENIX Security Symposium.

76.

One cell is enough to break tor's anonymity.

77.

The need for flow fingerprints to link correlated network flowsPETS.

78.

Users get routed: traffic correlation on tor by realistic adversariesACM CCS.

79.

Talek: a Private Publish-Subscribe Protocol.

80.

Unobservable communication over fully untrusted infrastructureOSDI.

81.

Riffle: An efficient communication system with strong anonymityPoPETs.

82.

Atom: Horizontally scaling strong anonymitySOSP.

83.

XRD: scalable messaging system with cryptographic privacy. CoRR, abs.

84.

Vuvuzela: scalable private messaging resistant to traffic analysisSOSP.

85.

Alpenhorn: Bootstrapping secure communication without leaking metadataOSDI.

86.

Aaron Swartz. Securedrop. https://securedrop.org/, 2013..

87.

Karaoke: Distributed private messaging immune to passive traffic analysisOSDI.

88.

Riposte: An Anonymous Messaging System Handling Millions of Users.

89.

Aaron Swartz. Securedrop. https://securedrop.org/, 2013..

99.

Appendix A and B.