Identifying harmful media in {End-to-End} encrypted communication: Efficient private membership computation

A Kulshrestha, J Mayer - 30th USENIX Security Symposium (USENIX …, 2021 - usenix.org
End-to-end encryption (E2EE) poses a challenge for automated detection of harmful media,
such as child sexual abuse material and extremist content. The predominant approach at …

Sok: Content moderation for end-to-end encryption

S Scheffler, J Mayer - arXiv preprint arXiv:2303.03979, 2023 - arxiv.org
Popular messaging applications now enable end-to-end-encryption (E2EE) by default, and
E2EE data storage is becoming common. These important advances for security and privacy …

Biometrics-authenticated key exchange for secure messaging

M Wang, K He, J Chen, Z Li, W Zhao, R Du - Proceedings of the 2021 …, 2021 - dl.acm.org
Secure messaging heavily relies on a session key negotiated by an Authenticated Key
Exchange (AKE) protocol. However, existing AKE protocols only verify the existence of a …

Hecate: Abuse reporting in secure messengers with sealed sender

R Issa, N Alhaddad, M Varia - 31st USENIX Security Symposium …, 2022 - usenix.org
End-to-end encryption provides strong privacy protections to billions of people, but it also
complicates efforts to moderate content that can seriously harm people. To address this …

End-to-End Secure Messaging with Traceability Only for Illegal Content

J Bartusek, S Garg, A Jain, GV Policharla - … International Conference on …, 2023 - Springer
As end-to-end encrypted messaging services become widely adopted, law enforcement
agencies have increasingly expressed concern that such services interfere with their ability …

Secure complaint-enabled source-tracking for encrypted messaging

C Peale, S Eskandarian, D Boneh - Proceedings of the 2021 ACM …, 2021 - dl.acm.org
While the end-to-end encryption properties of popular messaging schemes such as
Whatsapp, Messenger, and Signal guarantee privacy for users, these properties also make it …

Public verification for private hash matching

S Scheffler, A Kulshrestha… - 2023 IEEE Symposium on …, 2023 - ieeexplore.ieee.org
End-to-end encryption (E2EE) prevents online services from accessing user content. This
important security property is also an obstacle for content moderation methods that involve …

Fighting fake news in encrypted messaging with the fuzzy anonymous complaint tally system (facts)

L Liu, DS Roche, A Theriault… - arXiv preprint arXiv …, 2021 - arxiv.org
Recent years have seen a strong uptick in both the prevalence and real-world
consequences of false information spread through online platforms. At the same time …

Report when malicious: Deniable and accountable searchable message-moderation system

P Jiang, B Qiu, L Zhu - IEEE Transactions on Information …, 2022 - ieeexplore.ieee.org
Encrypted retrieval ensures the secure retrieval over the encrypted data without sacrificing
the confidentiality. Its applications in the database systems have brought this primitive under …

Robust, privacy-preserving, transparent, and auditable on-device blocklisting

K Thomas, S Meiklejohn, MA Specter, X Wang… - arXiv preprint arXiv …, 2023 - arxiv.org
With the accelerated adoption of end-to-end encryption, there is an opportunity to re-
architect security and anti-abuse primitives in a manner that preserves new privacy …