TESTIMONY, RECOVERY AND PLAUSIBLE DENIABILITY: A RESPONSE TO PEET
نویسندگان
چکیده
منابع مشابه
Testimony, recovery and plausible deniability: a response to Peet
According to telling based views of testimony (TBVs), B has reason to believe that p when A tells B that p because A thereby takes public responsibility for B's subsequent belief that p. Andrew Peet presents a new argument against TBVs. He argues that insofar as A uses context-sensitive expressions to express p, A doesn't take public responsibility for B's belief that p. Since context-sensitivi...
متن کاملPlausible Deniability
In this paper, we introduce the notion of Plausible Deniability in an information theoretic framework. We consider a scenario where an entity that eavesdrops through a broadcast channel summons one of the parties in a communication protocol to reveal their message (or signal vector). It is desirable that the summoned party have the option to reveal as little of the true message as possible by p...
متن کاملPlausible Plausible Deniability with an Epistemological Gap
We use encryption techniques to ensure that our data can only be read by the intended recipient. But what do we dowhen themere existence of the data — the metadata — is enough to make an attacker suspicious? Various Plausible Deniability Systems (PDS) have been proposed that claim to mask this metadata under the cloak of plausible deniability. We argue that none is actually plausible because th...
متن کاملPlausible Deniability for Privacy-Preserving Data Synthesis
Releasing full data records is one of the most challenging problems in data privacy. On the one hand, many of the popular techniques such as data de-identification are problematic because of their dependence on the background knowledge of adversaries. On the other hand, rigorous methods such as the exponential mechanism for differential privacy are often computationally impractical to use for r...
متن کاملPlausible Deniability Using Automated Linguistic Stegonagraphy
Information hiding has several applications, one of which is to hide the use of cryptography. The Nicetext [5, 6] system introduced a method for hiding cryptographic information by converting cryptographic strings (random-looking) into “nice text” (namely innocuous looking). The system retains the ability to recover the original ciphertext from the generated text. Nicetext can hide both plainte...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Episteme
سال: 2017
ISSN: 1742-3600,1750-0117
DOI: 10.1017/epi.2017.15