Re: [Pearg] Fwd: [Busec] Virtual BUsec seminar Wed 9/30 at 9:45 am: Sarah Scheffler, "Protecting Cryptography from Self-Incrimination"

DNR <temp@garbagedump.com> Mon, 28 September 2020 11:45 UTC

Return-Path: <temp@garbagedump.com>
X-Original-To: pearg@ietfa.amsl.com
Delivered-To: pearg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E4B3E3A104D for <pearg@ietfa.amsl.com>; Mon, 28 Sep 2020 04:45:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.308
X-Spam-Level:
X-Spam-Status: No, score=-2.308 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, NICE_REPLY_A=-0.213, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, URI_DOTEDU=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=garbagedump.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UIj960qs1hfG for <pearg@ietfa.amsl.com>; Mon, 28 Sep 2020 04:45:05 -0700 (PDT)
Received: from server61.fastdnsservers.com (server61.fastdnsservers.com [216.51.232.61]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 279093A104A for <Pearg@irtf.org>; Mon, 28 Sep 2020 04:44:59 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=garbagedump.com; s=default; h=Content-Type:In-Reply-To:MIME-Version:Date: Message-ID:From:References:To:Subject:Sender:Reply-To:Cc: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=dbzy+Kz8q5Ubr9rWP6H9U4SDZR3MdAz1BRak+JvvfxE=; b=bvTKtQJqwVrpSEN+Ga90xgLXY T1WSN/9ymYvkMRP2Osuvb0Ov/LbUfkyzBqkJMN3PfUdpYCMHKoSp8QslqqK1tTXwKoCtlpNS8BBGg bIGSKCdakq8cjg3vVM28j/nf2/aF/xix2kYW6z1r4+2Ufj7Yl+1Y18Usl7nYu7SZOsGo0=;
Received: from pool-151-203-73-141.bstnma.fios.verizon.net ([151.203.73.141]:54745 helo=[192.168.0.61]) by cpanel61.fastdnsservers.com with esmtpsa (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (Exim 4.93) (envelope-from <temp@garbagedump.com>) id 1kMraU-005ZK8-FY; Mon, 28 Sep 2020 06:44:58 -0500
To: "David R. Oran" <daveoran@orandom.net>, Pearg@irtf.org
References: <CAH_gZeGkab3No2VrJMb9rK6xM7JU=TGBoCDA_ooXkEPZ2Q3i1g@mail.gmail.com> <6362EFFB-0BA4-48C6-B97B-8737A1321F79@orandom.net>
From: DNR <temp@garbagedump.com>
Message-ID: <0043f217-d98d-ac52-5c1a-298a256e0d92@garbagedump.com>
Date: Mon, 28 Sep 2020 07:44:58 -0400
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:81.0) Gecko/20100101 Thunderbird/81.0
MIME-Version: 1.0
In-Reply-To: <6362EFFB-0BA4-48C6-B97B-8737A1321F79@orandom.net>
Content-Type: multipart/alternative; boundary="------------D9C20088EF7FA0C65A29DC04"
Content-Language: en-US
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - cpanel61.fastdnsservers.com
X-AntiAbuse: Original Domain - irtf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - garbagedump.com
X-Get-Message-Sender-Via: cpanel61.fastdnsservers.com: authenticated_id: temp@garbagedump.com
X-Authenticated-Sender: cpanel61.fastdnsservers.com: temp@garbagedump.com
X-Source:
X-Source-Args:
X-Source-Dir:
Archived-At: <https://mailarchive.ietf.org/arch/msg/pearg/59po1FnR3Iea8P5FpGKZYwE3HW4>
X-Mailman-Approved-At: Mon, 28 Sep 2020 10:53:59 -0700
Subject: Re: [Pearg] Fwd: [Busec] Virtual BUsec seminar Wed 9/30 at 9:45 am: Sarah Scheffler, "Protecting Cryptography from Self-Incrimination"
X-BeenThere: pearg@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Privacy Enhancements and Assessment Proposed RG <pearg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/pearg>, <mailto:pearg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pearg/>
List-Post: <mailto:pearg@irtf.org>
List-Help: <mailto:pearg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/pearg>, <mailto:pearg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Sep 2020 11:46:59 -0000

Thanks for the reference. Here is a link to the paper: 
https://eprint.iacr.org/2020/862.pdf

ChuckW

On 9/26/2020 10:11 AM, David R. Oran wrote:
>
> This work might be of interest to the PEARG community.
>
> DaveO
>
> Forwarded message:
>
>     From: Sarah Scheffler <sscheff@bu.edu>
>     To: busec <busec@cs.bu.edu>
>     Subject: [Busec] Virtual BUsec seminar Wed 9/30 at 9:45 am: Sarah
>     Scheffler, "Protecting Cryptography from Self-Incrimination"
>     Date: Fri, 25 Sep 2020 10:26:53 -0600
>
>     *Date/time: *Wed 9/30 at 9:45am ET
>     *Zoom link:
>     *https://bostonu.zoom.us/j/222968851?pwd=RTBhSnVnbDhqbnFrMWRSeVU1alYyUT09
>     <https://bostonu.zoom.us/j/222968851?pwd=RTBhSnVnbDhqbnFrMWRSeVU1alYyUT09>*
>     *
>     *Meeting ID: *222 968 851
>     *Password: *115101
>
>     -
>
>     *Speaker: *Sarah Scheffler
>     *Title: *"Protecting Cryptography from Self-Incrimination"
>     *Abstract: *
>     The information security community has devoted substantial effort
>     to the design, development, and universal deployment of strong
>     encryption schemes that withstand search and seizure by
>     computationally-powerful nation-state adversaries. In response,
>     governments are increasingly turning to a different tactic:
>     issuing subpoenas that compel people to decrypt devices
>     themselves, under the penalty of contempt of court if they do not
>     comply. Compelled decryption subpoenas sidestep questions around
>     government search powers that have dominated the Crypto Wars and
>     instead touch upon a different (and still unsettled) area of the
>     law: how encryption relates to a person's right to silence and
>     against self-incrimination.
>
>     In this work, we provide a rigorous, composable definition of a
>     critical piece of the law that determines whether cryptosystems
>     are vulnerable to government compelled disclosure in the United
>     States. We justify our definition by showing that it is consistent
>     with prior court cases. We prove that decryption is often not
>     compellable by the government under our definition. Conversely, we
>     show that many techniques that bolster security overall can leave
>     one more vulnerable to compelled disclosure.
>
>     As a result, we initiate the study of protecting cryptographic
>     protocols against the threat of future compelled disclosure. We
>     find that secure multi-party computation is particularly
>     vulnerable to this threat, and we design and implement new schemes
>     that are provably resilient in the face of government compelled
>     disclosure. We believe this work should influence the design of
>     future cryptographic primitives and contribute toward the legal
>     debates over the constitutionality of compelled decryption.
>
>     *Bio:*
>     Sarah is a fifth-year PhD student in the crypto/security group at
>     Boston University, advised by Prof. Mayank Varia. Her research
>     examines topics in the intersection of law and cryptography, as
>     well as zero-knowledge and secure messaging.
>
>     _______________________________________________
>     Busec mailing list
>     Busec@cs-mailman.bu.edu
>     https://cs-mailman.bu.edu/mailman/listinfo/busec
>     <https://cs-mailman.bu.edu/mailman/listinfo/busec>
>
>