Treffer: Eva: Efficient Privacy-Preserving Proof of Authenticity for Lossily Encoded Videos

Title:
Eva: Efficient Privacy-Preserving Proof of Authenticity for Lossily Encoded Videos
Source:
In: 2025 IEEE Symposium on Security and Privacy (SP). (pp. pp. 4643-4662). IEEE: San Francisco, CA, USA. (2025)
Publisher Information:
IEEE
Publication Year:
2025
Collection:
University College London: UCL Discovery
Document Type:
Report report
File Description:
text
Language:
English
Rights:
open
Accession Number:
edsbas.6CA56417
Database:
BASE

Weitere Informationen

With the increasing usage of fake videos in misinformation campaigns, proving the provenance of an edited video becomes critical, in particular, without revealing the original footage. We formalize the notion and security model of proofs of video authenticity and give the first cryptographic video authentication protocol Eva, which supports lossy codecs and arbitrary edits and is proven secure under well-established cryptographic assumptions. Compared to previous cryptographic methods for image authentication, Eva is not only capable of handling significantly larger amounts of data originating from the complex lossy video encoding but also achieves linear prover time, constant RAM usage, and constant proof size with respect to video size. These improvements have optimal theoretic complexity and are enabled by our two new theoretical advancements of integrating lookup arguments with folding-based incrementally verifiable computation (IVC) and compressing IVC proof efficiently, which may be of independent interest. For our implementation of Eva, we then integrate them with the Nova folding scheme, which we call Loua. As for concrete performance, we additionally utilize various optimizations such as tailored circuit design and GPU acceleration to make Eva highly practical: for a 2-minute HD (1280 × 720) video encoded in H.264 at 30 frames per second, Eva generates a 448 B proof in about 2.4 hours on consumer-grade hardware at 2.6 µs per pixel, surpassing state-of-the-art cryptographic image authentication schemes by more than an order of magnitude in terms of prover time and proof size.