163:
agencies for similar reasons; zero-knowledge services, however, are unable to do so, since their systems are designed to make clients' data inaccessible without the client's explicit cooperation.
140:
services keep a copy of the client's password on their servers, allowing clients who have lost their passwords to retrieve and decrypt their data using alternative means of
148:
store copies of clients' passwords, if a client loses their password then their data cannot be decrypted, making it practically unrecoverable.
270:
245:
17:
220:
203:
319:
314:
70:
304:
141:
105:
than would otherwise be possible. In addition, zero-knowledge services often strive to hold as little
97:
to the service provider. This means that neither the service provider, nor any third party that might
309:
101:, can decrypt and access the data without prior permission, allowing the client a higher degree of
74:
86:
90:
125:
28:
8:
199:
120:, which later switched to using the term "no knowledge" to avoid confusion with the
299:
191:
121:
102:
66:
195:
160:
98:
59:
35:
109:
as possible, holding only that data that is functionally needed by the service.
156:
293:
152:
137:
113:
221:"Snowden: Dropbox is hostile to privacy, unlike 'zero knowledge' Spideroak"
55:
63:
51:
190:. Lecture Notes in Computer Science. Vol. 8713. pp. 295–312.
180:
78:
117:
82:
246:"What Exactly is Zero-Knowledge in The Cloud and How Does it Work?"
106:
94:
271:"FBI demands Signal user data, but there's not much to hand over"
93:(in case there is more than one client), without disclosing the
181:"Zero-Knowledge Password Policy Checks and Verifier-Based PAKE"
73:, where the data is only accessible to the data's owner (the
77:), and not to the service provider. This is achieved by
291:
243:
178:
112:The term "zero-knowledge" was popularized by
179:Kiefer, Franziskus; Manulis, Mark (2014).
69:in a way that maintains a high level of
268:
14:
292:
218:
144:; but since zero-knowledge services
24:
155:services are also able to furnish
25:
331:
244:O'Sullivan, Fergus (2015-08-25).
188:Computer Security - ESORICS 2014
131:
262:
237:
212:
172:
170:
13:
1:
269:Farivar, Cyrus (2016-10-04).
166:
196:10.1007/978-3-319-11212-1_17
7:
219:Kiss, Jemima (2014-07-17).
10:
336:
26:
27:Not to be confused with
18:Zero knowledge service
320:Internet terminology
315:Secure communication
126:zero-knowledge proof
29:Zero-knowledge proof
99:intercept the data
305:Computer security
205:978-3-319-11211-4
42:(or occasionally
16:(Redirected from
327:
285:
284:
282:
281:
266:
260:
259:
257:
256:
241:
235:
234:
232:
231:
216:
210:
209:
185:
176:
122:computer science
21:
335:
334:
330:
329:
328:
326:
325:
324:
310:Backup software
290:
289:
288:
279:
277:
267:
263:
254:
252:
242:
238:
229:
227:
217:
213:
206:
183:
177:
173:
169:
161:law enforcement
157:access requests
134:
71:confidentiality
50:) refers to an
36:cloud computing
32:
23:
22:
15:
12:
11:
5:
333:
323:
322:
317:
312:
307:
302:
287:
286:
261:
236:
211:
204:
168:
165:
142:authentication
133:
130:
52:online service
40:zero-knowledge
9:
6:
4:
3:
2:
332:
321:
318:
316:
313:
311:
308:
306:
303:
301:
298:
297:
295:
276:
272:
265:
251:
247:
240:
226:
222:
215:
207:
201:
197:
193:
189:
182:
175:
171:
164:
162:
158:
154:
153:cloud storage
149:
147:
143:
139:
138:cloud storage
132:Disadvantages
129:
127:
123:
119:
115:
110:
108:
104:
100:
96:
92:
88:
87:client's side
84:
80:
76:
72:
68:
65:
61:
57:
53:
49:
45:
41:
37:
30:
19:
278:. Retrieved
275:Ars Technica
274:
264:
253:. Retrieved
249:
239:
228:. Retrieved
225:The Guardian
224:
214:
187:
174:
150:
145:
135:
111:
47:
44:no-knowledge
43:
39:
33:
124:concept of
64:manipulates
48:zero access
38:, the term
294:Categories
280:2021-05-29
255:2021-05-29
250:Cloudwards
230:2021-05-29
167:References
91:end-to-end
79:encrypting
118:SpiderOak
60:transfers
116:service
107:metadata
95:password
83:raw data
300:Privacy
103:privacy
85:at the
202:
146:do not
114:backup
75:client
56:stores
184:(PDF)
159:from
151:Most
136:Most
54:that
200:ISBN
81:the
67:data
192:doi
89:or
62:or
46:or
34:In
296::
273:.
248:.
223:.
198:.
186:.
128:.
58:,
283:.
258:.
233:.
208:.
194::
31:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.