Skip to main content
To KTH's start page To KTH's start page

2022-05-04 Mutual Contact Discovery

Seminar

Messaging services allow new users that join a service to find existing contacts that already use that service through a process called contact discovery. Existing users are similarly informed of new users that are already on their contact list. Current contact discovery protocols either allow the server to reconstruct the social graph, which is a serious privacy issue, or use trusted hardware to prevent this.

Time: Wed 2022-05-04 14.00

Location: Grimeton, Electrum

Video link: https://kth-se.zoom.us/j/66330495333

Participating: Jaap-Henk

Export to calendar

Abstract: Messaging services allow new users that join a service to find existing contacts that already use that service through a process called contact discovery. Existing users are similarly informed of new users that are already on their contact list. Current contact discovery protocols either allow the server to reconstruct the social graph (i.e., the graph describing who is a contact of who), which is a serious privacy issue, or use trusted hardware to prevent this. But even in the latter case, privacy is still at stake: when you join and enable contact discovery, anyone already on the service that has your number on their contact list gets notified that you joined. Even if you don’t know that person, or if it is an ex or former colleague that you long parted with and whose contact details you deleted long ago. To solve this, we propose severalmutual contact discovery protocols, that only allow users to discover each other when both are (still) in each other’s contact list. Mutual contact discovery has the additional advantage that it can be implemented in a more privacy friendly fashion (e.g., protecting the social graph from the server) than traditional, one-sided contact discovery, without even relying on trusted hardware.

Meeting with Jaap-Henk: If you would like to talk to Jaap-Henk, please email Hongyu (Hongyu Jin hongyuj@kth.se) with your availability (in-person/on-line) Tuesday afternoon to Thursday afternoon.

Jaap-Henk - please see http://www.cs.ru.nl/~jhh/about.html for his bio and work.

Belongs to: School of Electrical Engineering and Computer Science
Last changed: Jan 09, 2024
Title
2021-12-08: Testing Software and Hardware against Speculation Contracts
2021-12 03: Practical Data Access Minimization in Trigger-Action Platforms
2021-11-16: Securing software in the presence of realistic attackers and polices
2021-11-9: An In-depth Study of Java Deserialization Exploits and Vulnerabilities
2019-02-05 Faceted Secure Multi-Execution
2019-01-11 Privacy-preserving ridesharing and multi key-homomorphic signatures
2018-11-06 Authentication and Pairing Using Human Body Impedance
2018-10-26 Security and Privacy in the IoT: An Information-Theoretic Perspective
2018-09-17 Cyber-Defence Panel
2018-09-13: Reconfigurable Distributed MIMO for Physical-layer Security in Mobile Networks
2018-09-03: A Constraint Programming approach to deliver a Tolerant Algebraic Side-Channel Attack of AES
2018-06-18: Coarse-grained information-flow control as a library in Haskell
2018-06-07: The capacity of private information retrieval with eavesdroppers
2018-05-23: Information-Flow Control for Concurrent Programs with Declassification
2018-05-09: Browser fingerprinting: past, present and possible future
2018-05-07: The Verificatum Project 10-year Anniversary