{"id":"https://openalex.org/W4385080388","doi":"https://doi.org/10.1109/sp46215.2023.10179349","title":"Public Verification for Private Hash Matching","display_name":"Public Verification for Private Hash Matching","publication_year":2023,"publication_date":"2023-05-01","ids":{"openalex":"https://openalex.org/W4385080388","doi":"https://doi.org/10.1109/sp46215.2023.10179349"},"language":"en","primary_location":{"id":"doi:10.1109/sp46215.2023.10179349","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sp46215.2023.10179349","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE Symposium on Security and Privacy (SP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038503962","display_name":"Sarah Scheffler","orcid":"https://orcid.org/0000-0003-1202-7502"},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Sarah Scheffler","raw_affiliation_strings":["Princeton University"],"affiliations":[{"raw_affiliation_string":"Princeton University","institution_ids":["https://openalex.org/I20089843"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066527230","display_name":"Anunay Kulshrestha","orcid":null},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Anunay Kulshrestha","raw_affiliation_strings":["Princeton University"],"affiliations":[{"raw_affiliation_string":"Princeton University","institution_ids":["https://openalex.org/I20089843"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035795681","display_name":"Jonathan D. Mayer","orcid":"https://orcid.org/0000-0002-9224-9211"},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jonathan Mayer","raw_affiliation_strings":["Princeton University"],"affiliations":[{"raw_affiliation_string":"Princeton University","institution_ids":["https://openalex.org/I20089843"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5038503962"],"corresponding_institution_ids":["https://openalex.org/I20089843"],"apc_list":null,"apc_paid":null,"fwci":2.3527,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.89743463,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"253","last_page":"273"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9915000200271606,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9915000200271606,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6818864941596985},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.6323690414428711},{"id":"https://openalex.org/keywords/matching","display_name":"Matching (statistics)","score":0.5480544567108154},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.28303998708724976},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.13827729225158691},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.08446568250656128}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6818864941596985},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.6323690414428711},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.5480544567108154},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.28303998708724976},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.13827729225158691},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.08446568250656128}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/sp46215.2023.10179349","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sp46215.2023.10179349","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE Symposium on Security and Privacy (SP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6800000071525574,"display_name":"Gender equality","id":"https://metadata.un.org/sdg/5"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":63,"referenced_works":["https://openalex.org/W7678451","https://openalex.org/W1483325441","https://openalex.org/W1535955323","https://openalex.org/W1607188293","https://openalex.org/W1728441211","https://openalex.org/W1788576983","https://openalex.org/W1867048327","https://openalex.org/W1885156594","https://openalex.org/W1967182706","https://openalex.org/W1967373117","https://openalex.org/W2017386222","https://openalex.org/W2054711061","https://openalex.org/W2114550641","https://openalex.org/W2115063783","https://openalex.org/W2143087446","https://openalex.org/W2143869283","https://openalex.org/W2161187204","https://openalex.org/W2167882086","https://openalex.org/W2199845262","https://openalex.org/W2279816175","https://openalex.org/W2296436904","https://openalex.org/W2346756857","https://openalex.org/W2406556600","https://openalex.org/W2625527027","https://openalex.org/W2767024440","https://openalex.org/W2790912453","https://openalex.org/W2792127967","https://openalex.org/W2795178974","https://openalex.org/W2803120830","https://openalex.org/W2821751932","https://openalex.org/W2902726641","https://openalex.org/W2912601938","https://openalex.org/W2913435035","https://openalex.org/W2914359114","https://openalex.org/W2918523652","https://openalex.org/W2922077514","https://openalex.org/W2946525659","https://openalex.org/W2951834778","https://openalex.org/W2968257562","https://openalex.org/W2971142338","https://openalex.org/W3013638630","https://openalex.org/W3145609436","https://openalex.org/W3190095029","https://openalex.org/W3205577829","https://openalex.org/W3214430180","https://openalex.org/W3216221786","https://openalex.org/W4211115995","https://openalex.org/W4213264305","https://openalex.org/W4214602902","https://openalex.org/W4252567913","https://openalex.org/W4256585596","https://openalex.org/W4286588502","https://openalex.org/W4287117250","https://openalex.org/W4323349084","https://openalex.org/W6628605499","https://openalex.org/W6629998497","https://openalex.org/W6654945245","https://openalex.org/W6687670502","https://openalex.org/W6793664238","https://openalex.org/W6797348544","https://openalex.org/W6804312517","https://openalex.org/W6840061526","https://openalex.org/W7018261465"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"End-to-end":[0],"encryption":[1,45],"(E2EE)":[2],"prevents":[3],"online":[4],"services":[5],"from":[6],"accessing":[7],"user":[8,75],"content.":[9],"This":[10],"important":[11],"security":[12],"property":[13],"is":[14,249],"also":[15],"an":[16],"obstacle":[17],"for":[18,103,115,140,154,183,231],"content":[19,24,76,93,248],"moderation":[20],"methods":[21,139],"that":[22,224,236,245,267],"involve":[23],"analysis.":[25],"The":[26,265],"tension":[27],"between":[28],"E2EE":[29],"and":[30,121,131,159,163,176,190,255,273],"efforts":[31],"to":[32,89,94,118,128,156,259],"combat":[33],"child":[34],"sexual":[35],"abuse":[36],"material":[37],"(CSAM)":[38],"has":[39],"become":[40],"a":[41,71,78,100],"global":[42],"flashpoint":[43],"in":[44,106,186,192,251],"policy,":[46],"because":[47],"the":[48,86,95,144,152,160,187,193,240,252],"predominant":[49],"method":[50],"of":[51,80,174,217,228,261],"detecting":[52],"harmful":[53],"content\u2014server-side":[54],"perceptual":[55],"hash":[56,67,87,188,241,253],"matching":[57,68],"on":[58],"plaintext":[59],"images\u2014is":[60],"unavailable.Recent":[61],"applied":[62],"cryptography":[63],"advances":[64],"enable":[65,225],"private":[66],"(PHM),":[69],"where":[70],"service":[72],"can":[73],"match":[74],"against":[77],"set":[79,88,189],"known":[81],"CSAM":[82,105,158],"images":[83],"without":[84],"revealing":[85],"users":[90,260],"or":[91],"nonmatching":[92],"service.":[96],"These":[97],"designs,":[98],"especially":[99],"2021":[101],"proposal":[102],"identifying":[104],"Apple\u2019s":[107],"iCloud":[108],"Photos":[109],"service,":[110],"have":[111],"attracted":[112],"widespread":[113],"criticism":[114],"creating":[116],"risks":[117],"security,":[119],"privacy,":[120],"free":[122],"expression.In":[123],"this":[124,218],"work,":[125],"we":[126,177,268],"aim":[127],"advance":[129],"scholarship":[130],"dialogue":[132],"about":[133],"PHM":[134,155,232,277],"by":[135,143,206],"contributing":[136],"new":[137],"cryptographic":[138,212,222],"system":[141],"verification":[142,230],"general":[145],"public.":[146],"We":[147,195],"begin":[148],"with":[149,166,275],"motivation,":[150],"describing":[151],"rationale":[153],"detect":[157],"serious":[161],"societal":[162],"technical":[164],"issues":[165,201],"its":[167],"deployment.":[168],"Verification":[169],"could":[170],"partially":[171],"address":[172],"shortcomings":[173],"PHM,":[175],"systematize":[178],"critiques":[179],"into":[180],"two":[181,200],"areas":[182],"auditing:":[184],"trust":[185,191,213],"implementation.":[194],"explain":[196],"how,":[197],"while":[198],"these":[199],"cannot":[202],"be":[203],"fully":[204],"resolved":[205],"technology":[207],"alone,":[208],"there":[209],"are":[210,220,270],"possible":[211],"improvements.The":[214],"central":[215],"contributions":[216],"paper":[219],"novel":[221],"protocols":[223,266],"three":[226],"types":[227],"public":[229],"systems:":[233],"(1)":[234],"certification":[235],"external":[237],"groups":[238],"approve":[239],"set,":[242,254],"(2)":[243],"proof":[244],"particular":[246],"lawful":[247],"not":[250],"(3)":[256],"eventual":[257],"notification":[258],"false":[262],"positive":[263],"matches.":[264],"describe":[269],"practical,":[271],"efficient,":[272],"compatible":[274],"existing":[276],"constructions.":[278]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
