eprint.iacr.org will be offline for approximately an hour for routine maintenance at 11pm UTC on Tuesday, April 16. We lost some data between April 12 and April 14, and some authors have been notified that they need to resubmit their papers.
You are looking at a specific version 20190829:111524 of this paper. See the latest version.

Paper 2019/981

Traceback for End-to-End Encrypted Messaging

Nirvan Tyagi and Ian Miers and Thomas Ristenpart

Abstract

Messaging systems are used to spread misinformation and other malicious content, often with dire consequences. End-to-end encryption improves privacy but hinders content-based moderation and, in particular, obfuscates the original source of malicious content. We introduce the idea of message traceback, a new cryptographic approach that enables platforms to simultaneously provide end-to-end encryption while also being able to track down the source of malicious content reported by users. We formalize functionality and security goals for message traceback, and detail two constructions that allow revealing a chain of forwarded messages (path traceback) or the entire forwarding tree (tree traceback). We implement and evaluate prototypes of our traceback schemes to highlight their practicality, and provide a discussion of deployment considerations.

Metadata
Available format(s)
PDF
Category
Applications
Publication info
Published elsewhere. Minor revision. CCS 2019
DOI
10.1145/3319535.3354243
Keywords
end-to-end encrypted messaginganonymitytracingabuse reportingmessage franking
Contact author(s)
nirvan tyagi @ gmail com
History
2019-08-29: received
Short URL
https://ia.cr/2019/981
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.