Knowledge

Zero-knowledge service

Source đź“ť

163:
agencies for similar reasons; zero-knowledge services, however, are unable to do so, since their systems are designed to make clients' data inaccessible without the client's explicit cooperation.
140:
services keep a copy of the client's password on their servers, allowing clients who have lost their passwords to retrieve and decrypt their data using alternative means of
148:
store copies of clients' passwords, if a client loses their password then their data cannot be decrypted, making it practically unrecoverable.
270: 245: 17: 220: 203: 319: 314: 70: 304: 141: 105:
than would otherwise be possible. In addition, zero-knowledge services often strive to hold as little
97:
to the service provider. This means that neither the service provider, nor any third party that might
309: 101:, can decrypt and access the data without prior permission, allowing the client a higher degree of 74: 86: 90: 125: 28: 8: 199: 120:, which later switched to using the term "no knowledge" to avoid confusion with the 299: 191: 121: 102: 66: 195: 160: 98: 59: 35: 109:
as possible, holding only that data that is functionally needed by the service.
156: 293: 152: 137: 113: 221:"Snowden: Dropbox is hostile to privacy, unlike 'zero knowledge' Spideroak" 55: 63: 51: 190:. Lecture Notes in Computer Science. Vol. 8713. pp. 295–312. 180: 78: 117: 82: 246:"What Exactly is Zero-Knowledge in The Cloud and How Does it Work?" 106: 94: 271:"FBI demands Signal user data, but there's not much to hand over" 93:(in case there is more than one client), without disclosing the 181:"Zero-Knowledge Password Policy Checks and Verifier-Based PAKE" 73:, where the data is only accessible to the data's owner (the 77:), and not to the service provider. This is achieved by 291: 243: 178: 112:The term "zero-knowledge" was popularized by 179:Kiefer, Franziskus; Manulis, Mark (2014). 69:in a way that maintains a high level of 268: 14: 292: 218: 144:; but since zero-knowledge services 24: 155:services are also able to furnish 25: 331: 244:O'Sullivan, Fergus (2015-08-25). 188:Computer Security - ESORICS 2014 131: 262: 237: 212: 172: 170: 13: 1: 269:Farivar, Cyrus (2016-10-04). 166: 196:10.1007/978-3-319-11212-1_17 7: 219:Kiss, Jemima (2014-07-17). 10: 336: 26: 27:Not to be confused with 18:Zero knowledge service 320:Internet terminology 315:Secure communication 126:zero-knowledge proof 29:Zero-knowledge proof 99:intercept the data 305:Computer security 205:978-3-319-11211-4 42:(or occasionally 16:(Redirected from 327: 285: 284: 282: 281: 266: 260: 259: 257: 256: 241: 235: 234: 232: 231: 216: 210: 209: 185: 176: 122:computer science 21: 335: 334: 330: 329: 328: 326: 325: 324: 310:Backup software 290: 289: 288: 279: 277: 267: 263: 254: 252: 242: 238: 229: 227: 217: 213: 206: 183: 177: 173: 169: 161:law enforcement 157:access requests 134: 71:confidentiality 50:) refers to an 36:cloud computing 32: 23: 22: 15: 12: 11: 5: 333: 323: 322: 317: 312: 307: 302: 287: 286: 261: 236: 211: 204: 168: 165: 142:authentication 133: 130: 52:online service 40:zero-knowledge 9: 6: 4: 3: 2: 332: 321: 318: 316: 313: 311: 308: 306: 303: 301: 298: 297: 295: 276: 272: 265: 251: 247: 240: 226: 222: 215: 207: 201: 197: 193: 189: 182: 175: 171: 164: 162: 158: 154: 153:cloud storage 149: 147: 143: 139: 138:cloud storage 132:Disadvantages 129: 127: 123: 119: 115: 110: 108: 104: 100: 96: 92: 88: 87:client's side 84: 80: 76: 72: 68: 65: 61: 57: 53: 49: 45: 41: 37: 30: 19: 278:. Retrieved 275:Ars Technica 274: 264: 253:. Retrieved 249: 239: 228:. Retrieved 225:The Guardian 224: 214: 187: 174: 150: 145: 135: 111: 47: 44:no-knowledge 43: 39: 33: 124:concept of 64:manipulates 48:zero access 38:, the term 294:Categories 280:2021-05-29 255:2021-05-29 250:Cloudwards 230:2021-05-29 167:References 91:end-to-end 79:encrypting 118:SpiderOak 60:transfers 116:service 107:metadata 95:password 83:raw data 300:Privacy 103:privacy 85:at the 202:  146:do not 114:backup 75:client 56:stores 184:(PDF) 159:from 151:Most 136:Most 54:that 200:ISBN 81:the 67:data 192:doi 89:or 62:or 46:or 34:In 296:: 273:. 248:. 223:. 198:. 186:. 128:. 58:, 283:. 258:. 233:. 208:. 194:: 31:. 20:)

Index

Zero knowledge service
Zero-knowledge proof
cloud computing
online service
stores
transfers
manipulates
data
confidentiality
client
encrypting
raw data
client's side
end-to-end
password
intercept the data
privacy
metadata
backup
SpiderOak
computer science
zero-knowledge proof
cloud storage
authentication
cloud storage
access requests
law enforcement
"Zero-Knowledge Password Policy Checks and Verifier-Based PAKE"
doi
10.1007/978-3-319-11212-1_17

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑