JOURNAL ARTICLE

A Simple and Robust End-to-End Encryption Architecture for Anonymous and Secure Whistleblowing

Abstract

Much has been mentioned about the importance of whistleblowing. While all organizations are recommended to have a whistleblowing mechanism, there are very few completely software-based platforms that assist in performing this task securely. The primary concerns are to ensure that the whistleblower remains anonymous and the disclosures are securely delivered to the competent authority, usually media organizations. In this paper, we have analyzed the security of the state of the art software-based whistleblowing platforms and related research, identified security issues and proposed a new architecture that satisfactorily ensures the requirements for anonymous and secure whistleblowing. We have verified the strength of our solution against the existing platforms and related research with the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool. Our approach is practical, backed by cryptographic security and, because of its modularity, can be easily included in the current infrastructure of many whistleblowing platforms. The results show that our architecture is simple, robust and implements a complete end-to-end encryption strategy thus enabling secure and anonymous whistleblowing.

Keywords:
Computer security Computer science Encryption Cryptography Task (project management) Simple (philosophy) Architecture The Internet Modularity (biology) World Wide Web Engineering

Metrics

10
Cited By
1.08
FWCI (Field Weighted Citation Impact)
5
Refs
0.82
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Internet Traffic Analysis and Secure E-voting
Physical Sciences →  Computer Science →  Artificial Intelligence
Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications
Spam and Phishing Detection
Physical Sciences →  Computer Science →  Information Systems

Related Documents

BOOK-CHAPTER

Anonymous Traceback for End-to-End Encryption

Erin M. KenneyQiang TangChase Q. Wu

Lecture notes in computer science Year: 2022 Pages: 42-62
BOOK-CHAPTER

SDNS Architecture and End-to-end Encryption

Ruth NelsonJohn Heimann

Lecture notes in computer science Year: 2007 Pages: 356-366
JOURNAL ARTICLE

Secure Cloud Storage using End-to-End Encryption

Sujal SinhaMohit ShankarYash PandeK Susheel KumarShivank SharmaKhushwant Virdi

Journal:   International Journal for Research in Applied Science and Engineering Technology Year: 2023 Vol: 11 (12)Pages: 567-574
JOURNAL ARTICLE

Secure Chat Application with an End-to-End Encryption

Harrison CarranzaMiguel D. BustamanteAparicio CarranzaSuryaprakash Muniganti

Journal:   Proceedings of the World Congress on Electrical Engineering and Computer Systems and Science Year: 2024
© 2026 ScienceGate Book Chapters — All rights reserved.