May 15, 2023, 1:10 a.m. | Cheuk Ting Li, Sherman S. M. Chow

cs.CR updates on arXiv.org arxiv.org

Access control encryption (ACE) enforces, through a sanitizer as the
mediator, that only legitimate sender-receiver pairs can communicate, without
the sanitizer knowing the communication metadata, including its sender and
recipient identity, the policy over them, and the underlying plaintext. Any
illegitimate transmission is indistinguishable from pure noise. Existing works
focused on computational security and require trapdoor functions and possibly
other heavyweight primitives. We present the first ACE scheme with
information-theoretic security (unconditionally against unbounded adversaries).
Our novel randomization techniques over …

access access control ace communication computational control encryption identity metadata noise plaintext policy sanitizer secure access security transmission

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Information Security Specialist, Sr. (Container Hardening)

@ Rackner | San Antonio, TX

Principal Security Researcher (Advanced Threat Prevention)

@ Palo Alto Networks | Santa Clara, CA, United States

EWT Infosec | IAM Technical Security Consultant - Manager

@ KPMG India | Bengaluru, Karnataka, India

Security Engineering Operations Manager

@ Gusto | San Francisco, CA; Denver, CO; Remote

Network Threat Detection Engineer

@ Meta | Denver, CO | Reston, VA | Menlo Park, CA | Washington, DC