Jan. 11, 2023, 6:54 p.m. |

IACR News www.iacr.org

ePrint Report: Public Verification for Private Hash Matching

Sarah Scheffler, Anunay Kulshrestha, Jonathan Mayer


End-to-end encryption (E2EE) prevents online services from accessing user content. This important security property is also an obstacle for content moderation methods that involve content analysis. The tension between E2EE and efforts to combat child sexual abuse material (CSAM) has become a global flashpoint in encryption policy, because the predominant method of detecting harmful content---server-side perceptual hash matching on plaintext images---is unavailable.


Recent applied cryptography advances …

abuse analysis child child sexual abuse content moderation csam e2ee encryption end end-to-end eprint report flashpoint global hash important jonathan mayer moderation online services plaintext policy private public report security server services tension verification

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Digital Trust Cyber Transformation Senior

@ KPMG India | Mumbai, Maharashtra, India

Security Consultant, Assessment Services - SOC 2 | Remote US

@ Coalfire | United States

Sr. Systems Security Engineer

@ Effectual | Washington, DC

Cyber Network Engineer

@ SonicWall | Woodbridge, Virginia, United States

Security Architect

@ Nokia | Belgium