Innovating Augmented Reality Security: Recent E2E Encryption Approaches
- URL: http://arxiv.org/abs/2509.10313v1
- Date: Fri, 12 Sep 2025 14:56:05 GMT
- Title: Innovating Augmented Reality Security: Recent E2E Encryption Approaches
- Authors: Hamish Alsop, Leandros Maglaras, Helge Janicke, Iqbal H. Sarker, Mohamed Amine Ferrag,
- Abstract summary: End-to-end encryption (E2EE) has emerged as a fundamental element of modern digital communication.<n>This paper examines the dual role of E2EE, its critical importance to privacy, the challenges it presents.
- Score: 3.1008286675522214
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: End-to-end encryption (E2EE) has emerged as a fundamental element of modern digital communication, protecting data from unauthorized access during transmission. By design, E2EE ensures that only the intended recipient can decrypt the information, making it inaccessible even to service providers. Yet, this powerful safeguard of individual privacy and digital trust also introduces a paradox: it can simultaneously prevent law enforcement efforts by hiding potential malicious activities. This paper examines the dual role of E2EE, its critical importance to privacy, the challenges it
Related papers
- Compact and Selective Disclosure for Verifiable Credentials [42.799793508708426]
Self-Sovereign Identity (SSI) is a novel identity model that empowers individuals with full control over their data.<n>EUDI Regulation will enable all European citizens to seamlessly access services using Verifiable Credentials (VCs)<n>This paper proposes a novel mechanism designed to achieve Compact and Selective Disclosure for VCs (CSD-JWT)
arXiv Detail & Related papers (2025-05-30T21:53:07Z) - 2FA: Navigating the Challenges and Solutions for Inclusive Access [55.2480439325792]
Two-Factor Authentication (2FA) has emerged as a critical solution to protect online activities.<n>This paper examines the intricacies of deploying 2FA in a way that is secure and accessible to all users.<n>An analysis was conducted to examine the implementation and availability of various 2FA methods across popular online platforms.
arXiv Detail & Related papers (2025-02-17T12:23:53Z) - Balancing Confidentiality and Transparency for Blockchain-based Process-Aware Information Systems [43.253676241213626]
We propose an architecture for blockchain-based PAISs to preserve confidentiality and transparency.<n>Smart contracts enact, enforce and store public interactions, while attribute-based encryption techniques are adopted to specify access grants to confidential information.<n>We assess the security of our solution through a systematic threat model analysis and evaluate its practical feasibility.
arXiv Detail & Related papers (2024-12-07T20:18:36Z) - Collaborative Inference over Wireless Channels with Feature Differential Privacy [57.68286389879283]
Collaborative inference among multiple wireless edge devices has the potential to significantly enhance Artificial Intelligence (AI) applications.
transmitting extracted features poses a significant privacy risk, as sensitive personal data can be exposed during the process.
We propose a novel privacy-preserving collaborative inference mechanism, wherein each edge device in the network secures the privacy of extracted features before transmitting them to a central server for inference.
arXiv Detail & Related papers (2024-10-25T18:11:02Z) - Offline Digital Euro: a Minimum Viable CBDC using Groth-Sahai proofs [0.0]
Current digital payment solutions are fragile and offer less privacy than traditional cash.
No transaction can be executed during server malfunctions or power outages.
This thesis proposes a design and a first implementation for an offline-first digital euro.
arXiv Detail & Related papers (2024-07-01T09:55:14Z) - SoK: Web Authentication in the Age of End-to-End Encryption [9.053236170794579]
E2EE messaging and backup services have brought new challenges for usable authentication.
passwordless authentication ("passkeys") has become a promising candidate to replace passwords altogether.
E2EE authentication quickly becomes relevant not only for a niche group of dedicated E2EE enthusiasts but for the general public.
arXiv Detail & Related papers (2024-06-26T10:23:58Z) - Boosting Digital Safeguards: Blending Cryptography and Steganography [0.30783046172997025]
Steganography involves hiding data within another medium, thereby facilitating covert communication by making the message invisible.
This proposed approach takes advantage of the latest advancements in Artificial Intelligence (AI) and Deep Learning (DL), especially through the application of Generative Adversarial Networks (GANs)
The application of GANs enables a smart, secure system that utilizes the inherent sensitivity of neural networks to slight alterations in data.
arXiv Detail & Related papers (2024-04-09T03:36:39Z) - DynamiQS: Quantum Secure Authentication for Dynamic Charging of Electric Vehicles [61.394095512765304]
Dynamic Wireless Power Transfer (DWPT) is a novel technology that allows charging an electric vehicle while driving.
Recent advancements in quantum computing jeopardize classical public key cryptography.
We propose DynamiQS, the first post-quantum secure authentication protocol for dynamic wireless charging.
arXiv Detail & Related papers (2023-12-20T09:40:45Z) - Ensuring End-to-End Security with Fine-grained Access Control for Connected and Autonomous Vehicles [16.419749089728686]
We propose a practical and secure vehicular communication protocol for the E2E security based on a new attribute-based encryption scheme.
Our scheme achieves the confidentiality, message authentication, identity anonymity, unlinkability, traceability, and reconfigurable outsourced computation.
arXiv Detail & Related papers (2023-12-13T05:08:17Z) - InfoGuard: A Design and Usability Study of User-Controlled Application-Independent Encryption for Privacy-Conscious Users [1.2499537119440245]
Billions of secure messaging users have adopted end-to-end encryption (E2EE)
Most communication applications do not provide E2EE, and application silos prevent interoperability.
We propose InfoGuard, a system enabling E2EE for user-to-user communication in any application.
arXiv Detail & Related papers (2023-11-01T19:54:01Z) - Demonstration of quantum-digital payments [36.136619420474766]
We show how quantum light can secure daily digital payments by generating inherently unforgeable quantum cryptograms.
Unlike previously proposed protocols, our solution does not depend on long-term quantum storage or trusted agents and authenticated channels.
It is practical with near-term technology and may herald an era of quantum-enabled security.
arXiv Detail & Related papers (2023-05-23T20:20:14Z) - When Quantum Information Technologies Meet Blockchain in Web 3.0 [86.91054991998273]
We introduce a quantum blockchain-driven Web 3.0 framework that provides information-theoretic security for decentralized data transferring and payment transactions.
We discuss the potential applications and challenges of implementing quantum blockchain in Web 3.0.
arXiv Detail & Related papers (2022-11-29T05:38:42Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.