首页> 外文会议>International security protocols workshop >Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices
【24h】

Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices

机译:严重的机密:使用机密共享来与加密设备跨越边界

获取原文

摘要

Modern consumer electronic devices such as smartphones and laptops are laden with intimate personal data such as past conversations, photos and videos, medical information, and passwords for services that contain information on our entire lives. This makes the devices of particular interest to law enforcement officials during even routine searches. A particular threat to users is when crossing international borders, as we have repeatedly seen reports that the data on these devices is subject to search and seizure without warrants or even suspicion of wrongdoing. In some cases, travellers have even been compelled to provide PINs, passwords, encryption keys, and fingerprints to unlock their devices. In this position paper, we argue for the use of threshold cryptography to distribute encryption keys into shares, which are then securely transmitted to friends residing at the traveller's destination. When a traveller is subjected to scrutiny at the border, they are technically unable to comply with requests to decrypt their devices. Assuming the traveller is permitted to complete their journey, they must then physically interact with some (user-configurable) threshold number of their friends on that side of the border to recover their encryption keys. In our proposal, attackers must compromise both the traveller and a threshold number of the traveller's friends in order to learn anything about the secret key; the friends are unable to collude without the traveller present. We also implement Shatter Secrets, an open-source prototype Android app aimed at realizing this goal.
机译:现代消费电子设备(例如智能手机和笔记本电脑)上充斥着私密的个人数据,例如过去的对话,照片和视频,医疗信息以及包含我们一生的信息的服务密码。这使得执法人员甚至在例行搜查中都特别感兴趣的设备。用户的特别威胁是跨越国际边界时,因为我们屡次看到有关报告,这些设备上的数据会受到搜查和没收,没有任何逮捕令甚至怀疑有不法行为。在某些情况下,旅行者甚至被迫提供PIN,密码,加密密钥和指纹来解锁他们的设备。在本立场文件中,我们主张使用阈值密码术将加密密钥分配到共享中,然后将其安全地传输给居住在旅行者目的地的朋友。当旅行者在边境受到严格检查时,从技术上讲,他们无法遵守对他们的设备进行解密的请求。假设旅行者被允许完成旅行,他们必须随后与边界那边的一些(用户可配置)阈值数量的朋友进行物理交互,以恢复其加密密钥。在我们的建议中,攻击者必须同时折衷旅行者和一定数量的旅行者朋友,才能了解有关密钥的任何信息;如果没有旅行者在场,朋友们就无法勾结。我们还实现了Shatter Secrets,这是一个旨在实现这一目标的开源原型Android应用程序。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号