Abstract
We motivate and introduce our design and development of a secure submission front-end for online whistleblowing platforms. Our system is designed to provide a level of anonymity in the face of adversaries who can perform end-to-end traffic analysis.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Alexa (April 2012), http://www.alexa.com
Banisar, D.: Whistleblowing — International Standards and Developments. Transparency International (February 2009)
Berthold, S., Böhme, R., Köpsell, S.: Data retention and anonymity services. In: Matyáš, V., Fischer-Hübner, S., Cvrček, D., Švenda, P. (eds.) The Future of Identity. IFIP AICT, vol. 298, pp. 92–106. Springer, Heidelberg (2009)
E. R. Center: 2011 National Business Ethics Survey, 2345 Crystal Drive, Suite 201, Arlington, VA 22202, USA (2012), http://www.ethics.org/nbes
Chakravarty, S., Stavrou, A., Keromytis, A.D.: Traffic analysis against low-latency anonymity networks using available bandwidth estimation. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 249–267. Springer, Heidelberg (2010)
Damgård, I., Jurik, M., Nielsen, J.: A generalization of Paillier’s public-key system with applications to electronic voting. International Journal of Information Security 9, 371–385 (2010)
Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: Proc. USENIX Security Symposium, pp. 303–320 (2004)
Dyer, K.P., Coull, S.E., Ristenpart, T., Shrimpton, T.: Peek-a-boo, i still see you: Why efficient traffic analysis countermeasures fail. In: IEEE Symposium on Security and Privacy, pp. 332–346 (2012)
Gustin, S.: Columbia university reverses anti-WikiLeaks guidance (December 2010), http://www.wired.com/threatlevel/2010/12/columbia-wikileaks-policy/
Lennane, K.J.: “Whisteblowing” a health issue. British Medical Journal 307, 667–670 (1993)
MacKay, D.: Fountain codes. IEE Proceedings 152(6) (December 2005)
Osterhaus, A., Fagan, C.: Alternative to Silence — Whistleblower Protection in 10 European Countries. Transparency International (2009)
Pedersen, T.P.: Non-interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129–140. Springer, Heidelberg (1992)
Roth, V., Güldenring, B., Rieffel, E., Dietrich, S., Ries, L.: A secure submission system for online whistleblowing platforms (January 2013), http://arxiv.org/abs/1301.6263
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Roth, V., Güldenring, B., Rieffel, E., Dietrich, S., Ries, L. (2013). A Secure Submission System for Online Whistleblowing Platforms. In: Sadeghi, AR. (eds) Financial Cryptography and Data Security. FC 2013. Lecture Notes in Computer Science, vol 7859. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39884-1_30
Download citation
DOI: https://doi.org/10.1007/978-3-642-39884-1_30
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-39883-4
Online ISBN: 978-3-642-39884-1
eBook Packages: Computer ScienceComputer Science (R0)