An Inconvenient Trust: User Attitudes Toward Security and Usability Tradeoffs for Key-Directory Encryption Systems

dc.contributor.authorBai, Wei
dc.contributor.authorKim, Doowon
dc.contributor.authorNamara, Moses
dc.contributor.authorQian, Yichen
dc.contributor.authorGage Kelley, Patrick
dc.contributor.authorMazurek, Michelle L.
dc.date.accessioned2022-09-01T17:21:42Z
dc.date.available2022-09-01T17:21:42Z
dc.date.issued2016
dc.description.abstractMany critical communications now take place digitally, but recent revelations demonstrate that these communications can often be intercepted. To achieve true message privacy, users need end-to-end message encryption, in which the communications service provider is not able to decrypt the content. Historically, end-to-end encryption has proven extremely difficult for people to use correctly, but recently tools like Apple’s iMessage and Google’s End-to-End have made it more broadly accessible by using key-directory services. These tools (and others like them) sacrifice some security properties for convenience, which alarms some security experts, but little is known about how average users evaluate these tradeoffs. In a 52-person interview study, we asked participants to complete encryption tasks using both a traditional key-exchange model and a key-directory-based registration model. We also described the security properties of each (varying the order of presentation) and asked participants for their opinions. We found that participants understood the two models well and made coherent assessments about when different tradeoffs might be appropriate. Our participants recognized that the less-convenient exchange model was more secure overall, but found the security of the registration model to be “good enough” for many everyday purposes.en_US
dc.identifier.citationBai, W., Namara, M., Qian, Y., Kelley, P. G., Mazurek, M. L., & Kim, D. (2016). An Inconvenient Trust: User Attitudes toward Security and Usability Tradeoffs for {Key-Directory} Encryption Systems. In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016) (pp. 113-130).en_US
dc.identifier.isbn978-1-931971-31-7
dc.identifier.urihttps://nru.uncst.go.ug/handle/123456789/4525
dc.language.isoenen_US
dc.publisherUSENIXen_US
dc.titleAn Inconvenient Trust: User Attitudes Toward Security and Usability Tradeoffs for Key-Directory Encryption Systemsen_US
dc.typeOtheren_US
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
An Inconvenient Trust.pdf
Size:
1.98 MB
Format:
Adobe Portable Document Format
Description:
Conference Paper
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: