A Secure Submission System for Online Whistleblowing Platforms | SpringerLink
Skip to main content

A Secure Submission System for Online Whistleblowing Platforms

  • Conference paper
Financial Cryptography and Data Security (FC 2013)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7859))

Included in the following conference series:

Abstract

We motivate and introduce our design and development of a secure submission front-end for online whistleblowing platforms. Our system is designed to provide a level of anonymity in the face of adversaries who can perform end-to-end traffic analysis.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 5719
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Alexa (April 2012), http://www.alexa.com

  2. Banisar, D.: Whistleblowing — International Standards and Developments. Transparency International (February 2009)

    Google Scholar 

  3. Berthold, S., Böhme, R., Köpsell, S.: Data retention and anonymity services. In: Matyáš, V., Fischer-Hübner, S., Cvrček, D., Švenda, P. (eds.) The Future of Identity. IFIP AICT, vol. 298, pp. 92–106. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  4. E. R. Center: 2011 National Business Ethics Survey, 2345 Crystal Drive, Suite 201, Arlington, VA 22202, USA (2012), http://www.ethics.org/nbes

  5. Chakravarty, S., Stavrou, A., Keromytis, A.D.: Traffic analysis against low-latency anonymity networks using available bandwidth estimation. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 249–267. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  6. Damgård, I., Jurik, M., Nielsen, J.: A generalization of Paillier’s public-key system with applications to electronic voting. International Journal of Information Security 9, 371–385 (2010)

    Article  Google Scholar 

  7. Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: Proc. USENIX Security Symposium, pp. 303–320 (2004)

    Google Scholar 

  8. Dyer, K.P., Coull, S.E., Ristenpart, T., Shrimpton, T.: Peek-a-boo, i still see you: Why efficient traffic analysis countermeasures fail. In: IEEE Symposium on Security and Privacy, pp. 332–346 (2012)

    Google Scholar 

  9. Gustin, S.: Columbia university reverses anti-WikiLeaks guidance (December 2010), http://www.wired.com/threatlevel/2010/12/columbia-wikileaks-policy/

  10. Lennane, K.J.: “Whisteblowing” a health issue. British Medical Journal 307, 667–670 (1993)

    Article  Google Scholar 

  11. MacKay, D.: Fountain codes. IEE Proceedings 152(6) (December 2005)

    Google Scholar 

  12. Osterhaus, A., Fagan, C.: Alternative to Silence — Whistleblower Protection in 10 European Countries. Transparency International (2009)

    Google Scholar 

  13. Pedersen, T.P.: Non-interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129–140. Springer, Heidelberg (1992)

    Google Scholar 

  14. Roth, V., Güldenring, B., Rieffel, E., Dietrich, S., Ries, L.: A secure submission system for online whistleblowing platforms (January 2013), http://arxiv.org/abs/1301.6263

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Roth, V., Güldenring, B., Rieffel, E., Dietrich, S., Ries, L. (2013). A Secure Submission System for Online Whistleblowing Platforms. In: Sadeghi, AR. (eds) Financial Cryptography and Data Security. FC 2013. Lecture Notes in Computer Science, vol 7859. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39884-1_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-39884-1_30

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-39883-4

  • Online ISBN: 978-3-642-39884-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics