Secret Key Recovery in a {Global-Scale}{End-to-End} Encryption System

G Connell, V Fang, R Schmidt, E Dauterman… - … USENIX Symposium on …, 2024 - usenix.org
End-to-end encrypted messaging applications ensure that an attacker cannot read a user's
message history without their decryption keys. While this provides strong privacy, it creates a …

Reflections on trusting distributed trust

E Dauterman, V Fang, N Crooks, RA Popa - Proceedings of the 21st …, 2022 - dl.acm.org
Many systems today distribute trust across multiple parties such that the system provides
certain security properties if a subset of the parties are honest. In the past few years, we …

[PDF][PDF] How to Recover a Cryptographic Secret From the Cloud.

C Orsini, A Scafuro, T Verber - IACR Cryptol. ePrint Arch., 2023 - iacr.steepath.eu
Clouds have replaced local backup systems due to their stronger reliability and availability
guarantees compared to local machines, which are prone to hardware/software failure or …

: End-to-End Hybrid Authenticated Key Exchanges

S Bruckner, S Ramacher, C Striecks - International Conference on Post …, 2023 - Springer
End-to-end authenticity in public networks plays a significant role. Namely, without
authenticity, the adversary might be able to retrieve even confidential information straight …

SoK: Web Authentication in the Age of End-to-End Encryption

J Blessing, D Hugenroth, RJ Anderson… - arxiv preprint arxiv …, 2024 - arxiv.org
The advent of end-to-end encrypted (E2EE) messaging and backup services has brought
new challenges for usable authentication. Compared to regular web services, the nature of …

Accountable authentication with privacy protection: The Larch system for universal login

E Dauterman, D Lin, H Corrigan-Gibbs… - … USENIX Symposium on …, 2023 - usenix.org
Credential compromise is hard to detect and hard to mitigate. To address this problem, we
present larch, an accountable authentication framework with strong security and privacy …

Acsesor: A new framework for auditable custodial secret storage and recovery

M Chase, H Davis, E Ghosh, K Laine - Cryptology ePrint Archive, 2022 - eprint.iacr.org
Custodial secret management services provide a convenient centralized user experience,
portability, and emergency recovery for users who cannot reliably remember or store their …

Avoiding lock outs: Proactive FIDO account recovery using managerless group signatures

SS Arora, S Badrinarayanan, S Raghuraman… - Cryptology ePrint …, 2022 - eprint.iacr.org
Passwords are difficult to remember, easy to guess and prone to hacking. While there have
been several attempts to solve the aforementioned problems commonly associated with …

End-to-same-end encryption: modularly augmenting an app with an efficient, portable, and blind cloud storage

L Chen, YN Li, Q Tang, M Yung - ACM Transactions on Privacy and …, 2022 - dl.acm.org
The cloud has become pervasive, and we ask: how can we protect cloud data against the
cloud itself? For secure user-to-user communication via a cloud server, End-to-End …

Scalable and secure virtualization of HSM with ScaleTrust

J Han, I Yun, S Kim, T Kim, S Son… - IEEE/ACM Transactions …, 2022 - ieeexplore.ieee.org
Hardware security modules (HSMs) have been utilized as a trustworthy foundation for cloud
services. Unfortunately, existing systems using HSMs fail to meet multi-tenant scalability …