{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:22:35Z","timestamp":1766067755056},"reference-count":115,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1109\/sp46215.2023.10179349","type":"proceedings-article","created":{"date-parts":[[2023,7,21]],"date-time":"2023-07-21T17:18:15Z","timestamp":1689959895000},"page":"253-273","source":"Crossref","is-referenced-by-count":9,"title":["Public Verification for Private Hash Matching"],"prefix":"10.1109","author":[{"given":"Sarah","family":"Scheffler","sequence":"first","affiliation":[{"name":"Princeton University"}]},{"given":"Anunay","family":"Kulshrestha","sequence":"additional","affiliation":[{"name":"Princeton University"}]},{"given":"Jonathan","family":"Mayer","sequence":"additional","affiliation":[{"name":"Princeton University"}]}],"member":"263","reference":[{"volume-title":"The Double Ratchet Algorithm","year":"2016","author":"Perrin","key":"ref1"},{"volume-title":"Why does WhatsApp Enable End-to-End Encryption?","year":"2018","author":"Kent","key":"ref2"},{"volume-title":"iMessage Security Overview","year":"2021","key":"ref3"},{"volume-title":"Messages End-to-End Encryption Overview","year":"2022","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313482"},{"volume-title":"PhotoDNA","year":"2021","key":"ref6"},{"volume-title":"Fighting child sexual abuse online","year":"2021","key":"ref7"},{"volume-title":"Resource Guide","key":"ref8"},{"key":"ref9","article-title":"Current approaches to terrorist and violent extremist content among the global top 50 online content-sharing services","volume-title":"Organization for Economic Co-Operation and Development, Tech. Rep.","author":"Llanos","year":"2020"},{"key":"ref10","article-title":"Google drive cloud storage service employs hash matching to detect pirated content","volume-title":"Hot Hardware","author":"Goetting","year":"2017"},{"key":"ref11","article-title":"Facebook asks users for nude photos in project to combat \u2018revenge porn\u2019","volume-title":"The Guardian","author":"Solon","year":"2017"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.04.044"},{"key":"ref13","article-title":"Image hash list"},{"key":"ref14","article-title":"Identifying harmful media in end-to-end encrypted communication: Efficient private membership computation","volume-title":"USENIX Security 2021","author":"Kulshrestha","year":"2021"},{"key":"ref15","article-title":"The apple psi system","volume-title":"Tech. Rep.","author":"Bhowmick","year":"2021"},{"year":"2021","key":"ref16","article-title":"Expanded protections for children"},{"year":"2020","key":"ref17","article-title":"International statement: End-to-end encryption and public safety"},{"year":"2021","key":"ref18","article-title":"A welcome step: a statement of support for apple\u2019s plans to detect child sexual abuse images"},{"year":"2022","key":"ref19","article-title":"Safety tech challenge fund"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyad020"},{"article-title":"International coalition calls on apple to abandon plan to build surveillance capabilities into iphones, ipads, and other products","year":"2021","author":"Franklin","key":"ref21"},{"key":"ref22","article-title":"Apple\u2019s new \u2018child safety\u2019 plan for iphones isn\u2019t so safe","volume-title":"American Civil Liberties Union","author":"Gillmor","year":"2021"},{"key":"ref23","article-title":"Apple wants to protect children. but it\u2019s creating serious privacy risks","volume-title":"New York Times","author":"Green","year":"2021"},{"key":"ref24","article-title":"Outside looking in","volume-title":"Center for Democracy and Technology","author":"Kamara","year":"2021"},{"key":"ref25","article-title":"Apple\u2019s iphone: Now with built-in surveillance","volume-title":"Cato Institute","author":"Sanchez","year":"2021"},{"key":"ref26","article-title":"Apple\u2019s plan to \u201dthink different\" about encryption opens a backdoor to your private life","volume-title":"Electronic Frontier Foundation","author":"McKinney","year":"2021"},{"key":"ref27","article-title":"A technical explainer on apple\u2019s concerning privacy changes","volume-title":"New America","author":"Meysenburg","year":"2021"},{"article-title":"Here\u2019s why apple\u2019s new child safety features are so controversial","year":"2021","author":"Patel","key":"ref28"},{"key":"ref29","article-title":"The law and policy of client-side scanning","volume-title":"Lawfare","author":"Rosenzweig","year":"2020"},{"article-title":"The broken promise of apple\u2019s announced forbidden-photo reporting system \u2013 and how to fix it","year":"2021","author":"Canetti","key":"ref30"},{"key":"ref31","article-title":"Apple plans new encryption system to ward off hackers and protect icloud data","volume-title":"Wall Street Journal","author":"McMillan","year":"2022"},{"year":"2021","key":"ref32","article-title":"How hash matching technology helps ncmec"},{"year":"2016","key":"ref33","article-title":"Eliminating child sexual abuse material: The role and impact of hash values"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.54501\/jots.v1i2.14"},{"year":"2019","key":"ref35","article-title":"Moving the encryption policy conversation forward"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.17226\/25010"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyv009"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2023-0060"},{"author":"for Missing","key":"ref39","article-title":"The issues"},{"article-title":"Thoughts on child safety on commodity platforms","year":"2022","author":"Levy","key":"ref40"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1027\/1016-9040\/a000326"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.avb.2018.02.013"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1177\/1079063210369013"},{"key":"ref44","article-title":"Trends in arrests for child pornography production: The third national juvenile online victimization study (njov-3)","author":"Wolak","year":"2012","journal-title":"Crimes against Children Research Center"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.4324\/9780429460593-14"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1086\/scr.1982.3109559"},{"volume-title":"Survivors\u2019 Survey","year":"2017","key":"ref47"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26954-8_8"},{"key":"ref49","article-title":"Estimating incidental collection in foreign intelligence surveillance: Large-scale multiparty private set intersection with union and sum","volume-title":"USENIX Security 2022","author":"Kulshrestha","year":"2022"},{"volume-title":"2020 Reports by Electronic Service Providers (ESP)","key":"ref50"},{"article-title":"Dragonflai","year":"2021","author":"Hicks","key":"ref51"},{"article-title":"T3k.ai","year":"2022","author":"Jackson","key":"ref52"},{"year":"2021","key":"ref53","article-title":"Galaxkey wins uk government funding to enable children to communicate safely online"},{"key":"ref54","article-title":"Apple didn\u2019t engage with the infosec world on csam scanning \u2013 so get used to a slow drip feed of revelations","volume-title":"The Register","author":"Claburn","year":"2021"},{"key":"ref55","article-title":"We built a system like apple\u2019s to flag child sexual abuse material \u2014 and concluded the tech was dangerous","volume-title":"Washington Post","author":"Mayer","year":"2021"},{"key":"ref56","article-title":"More on apple\u2019s client-side csam scanning","volume-title":"Educated Guesswork","author":"Rescorla","year":"2021"},{"volume-title":"Going dark: impact to intelligence and law enforcement and threat mitigation","year":"2017","author":"Mitchell","key":"ref57"},{"key":"ref58","article-title":"Inside apple\u2019s compromises in china: A times investigation","volume-title":"New York Times","author":"Nicas","year":"2021"},{"key":"ref59","article-title":"Whatsapp sues india\u2019s government to stop new internet rules","volume-title":"New York Times","author":"Isaac","year":"2021"},{"key":"ref60","article-title":"Apple and google remove \u2018navalny\u2019 voting app in russia","volume-title":"New York Times","author":"Troianovski","year":"2021"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.2307\/1342743"},{"key":"ref62","article-title":"More content moderation is not always better","volume-title":"Wired","author":"Douek","year":"2021"},{"article-title":"Adversarial detection avoidance attacks: Evaluating the robustness of perceptual hashing-based client-side scanning","year":"2021","author":"Jain","key":"ref63"},{"volume-title":"Security Threat Model Review of Apple\u2019s Child Safety Features","year":"2021","key":"ref64"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2016.51"},{"article-title":"Imagenet contains naturally occurring neuralhash collisions","year":"2021","author":"Dwyer","key":"ref66"},{"article-title":"Neuralhash collider","year":"2021","author":"Athalye","key":"ref67"},{"article-title":"Learning to break deep perceptual hashing: The use case neuralhash","volume-title":"IEEE Workshop on Technology and Consumer Protection","author":"Hintersdorf","key":"ref68"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48987.2021.00052"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813608"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737444"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/3079856.3080230"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_35"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49387-8_8"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36288-6_3"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68339-9_31"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2003.12.002"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1137\/080728743"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/2674005.2674994"},{"key":"ref80","first-page":"515","article-title":"Phasing: Private set intersection using permutation-based hashing","author":"Pinkas","year":"2015","journal-title":"USENIX Security"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78372-7_5"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0037"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17659-4_5"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45724-2_25"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47870-1_2"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2006.265125"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2006.881948"},{"article-title":"pHash: The open source perceptual hash library","year":"2013","author":"Klinger","key":"ref88"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxv079"},{"article-title":"Testing different image hash functions","year":"2018","author":"Project","key":"ref90"},{"key":"ref91","article-title":"Squint hard enough: Evaluating perceptual hashing with machine learning","author":"Prokos","year":"2021","journal-title":"Cryptology ePrint Archive"},{"volume-title":"CSAM Detection Technical Summary","year":"2021","key":"ref92"},{"key":"ref93","article-title":"Engrave danger: An analysis of apple engraving censorship across six regions","volume-title":"The Citizen Lab","author":"Knockel","year":"2021"},{"key":"ref94","first-page":"553","article-title":"A simpler variant of universally composable security for standard multiparty computation","volume-title":"IACR Cryptol. ePrint Arch.","author":"Canetti","year":"2014"},{"volume-title":"Expanded Protections for Children: Frequently Asked Questions","year":"2021","key":"ref95"},{"article-title":"A message to our customers","year":"2016","author":"Cook","key":"ref96"},{"year":"2021","key":"ref97","article-title":"iCloud operated by GCBD Terms and Conditions"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11799-2_30"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36362-7_5"},{"key":"ref100","article-title":"One-way accumulators: A decentralized alternative to digital sinatures (extended abstract)","volume-title":"EUROCRYPT \u201993","author":"Benaloh","year":"1993"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26948-7_20"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45708-9_5"},{"key":"ref103","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-24676-3_1","article-title":"Efficient private matching and set intersection","volume-title":"EUROCRYPT 2004","author":"Freedman","year":"2004"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-58387-6_11"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/eurosp.2017.13"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-40186-3_27"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46766-1_9"},{"article-title":"(can\u2019t) picture this 2","year":"2019","author":"Knockel","key":"ref108"},{"key":"ref109","article-title":"Russia bans picture of vladimir putin in drag","volume-title":"The Guardian","author":"Cresci","year":"2017"},{"article-title":"EMP-toolkit: Efficient MultiParty computation toolkit","year":"2016","author":"Wang","key":"ref110"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134053"},{"article-title":"\u2018bristol fashion\u2019 mpc circuits","year":"2020","author":"Archer","key":"ref112"},{"key":"ref113","article-title":"Universally composable security: A new paradigm for cryptographic protocols","volume-title":"IEEE","author":"Canetti","year":"2005"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_30"},{"article-title":"A graduate course in applied cryptography","year":"2020","author":"Boneh","key":"ref115"}],"event":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","start":{"date-parts":[[2023,5,21]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2023,5,25]]}},"container-title":["2023 IEEE Symposium on Security and Privacy (SP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10179215\/10179280\/10179349.pdf?arnumber=10179349","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,20]],"date-time":"2024-07-20T05:17:16Z","timestamp":1721452636000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10179349\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5]]},"references-count":115,"URL":"https:\/\/doi.org\/10.1109\/sp46215.2023.10179349","relation":{},"subject":[],"published":{"date-parts":[[2023,5]]}}}