Paper 2020/862

Protecting Cryptography Against Compelled Self-Incrimination

Sarah Scheffler and Mayank Varia

Abstract

The information security community has devoted substantial effort to the design, development, and universal deployment of strong encryption schemes that withstand search and seizure by computationally-powerful nation-state adversaries. In response, governments are increasingly turning to a different tactic: issuing subpoenas that compel people to decrypt devices themselves, under the penalty of contempt of court if they do not comply. Compelled decryption subpoenas sidestep questions around government search powers that have dominated the Crypto Wars and instead touch upon a different (and still unsettled) area of the law: how encryption relates to a person's right to silence and against self-incrimination. In this work, we provide a rigorous, composable definition of a critical piece of the law that determines whether cryptosystems are vulnerable to government compelled disclosure in the United States. We justify our definition by showing that it is consistent with prior court cases. We prove that decryption is often not compellable by the government under our definition. Conversely, we show that many techniques that bolster security overall can leave one more vulnerable to compelled disclosure. As a result, we initiate the study of protecting cryptographic protocols against the threat of future compelled disclosure. We find that secure multi-party computation is particularly vulnerable to this threat, and we design and implement new schemes that are provably resilient in the face of government compelled disclosure. We believe this work should influence the design of future cryptographic primitives and contribute toward the legal debates over the constitutionality of compelled decryption.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Published elsewhere. Minor revision. USENIX Security Symposium 2021
Keywords
compelled decryptionlaw and policydistributed cryptography
Contact author(s)
sscheff @ bu edu
varia @ bu edu
History
2020-12-30: revised
2020-07-12: received
See all versions
Short URL
https://ia.cr/2020/862
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2020/862,
      author = {Sarah Scheffler and Mayank Varia},
      title = {Protecting Cryptography Against Compelled Self-Incrimination},
      howpublished = {Cryptology ePrint Archive, Paper 2020/862},
      year = {2020},
      note = {\url{https://eprint.iacr.org/2020/862}},
      url = {https://eprint.iacr.org/2020/862}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.