Battling Disinformation With Cryptography: Correspondence

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

Correspondence

https://doi.org/10.1038/s42256-023-00733-2

Battling disinformation with cryptography


Check for updates

I
nformation and communication tech- provenance8,9. The C2PA proposes to resolve This makes zk-SNARKs powerful tools for estab-
nologies have led to an unprecedented this problem by attaching the complete, lishing the trustworthy origin and editing his-
surge of disinformation1, interfering in signed original and its editing history6, but tory of digital content without exposing the
areas from democratic elections to armed such attachments typically conflict with size original content or its creator8,9.
conflicts. With the broad diffusion of gen- and confidentiality restrictions9. Second, Even with these promising developments,
erative artificial intelligence (AI) tools such as establishing trustworthy provenance often substantial work remains until secure digital
ChatGPT, Dall-E and Midjourney, the situation requires the disclosure of selected identity identities and ZKPs can establish strong bul-
may become even worse. These tools make it attributes of content creators and editors, warks against disinformation and fake news.
easy and cheap to fabricate authentic-looking which may conflict with the need to protect Professionals must ensure that their hardware
content, such as images, audio files and videos vulnerable or confidential sources. Third, supports the creation of cryptographically
(‘deep fakes’)2 that spread falsehoods and sway trust in content distribution requires strong verifiable content and that their editing tools
public opinion. AI tools can also facilitate auto- authentication mechanisms — for example, to can generate modification proofs. Generic
mated micro-targeting of users at scale, trapping single out bots on social media. Today, these zero-knowledge virtual machines, which
them in tight echo chambers and filter bubbles3. mechanisms usually involve unique identifiers can generate ZKPs for the correct execution
Without countermeasures, it will be increasingly that present substantial privacy risks. of any (editing) tool, may help to also cover
difficult to find the needle of truth in a haystack These problems can be addressed with open-source tools with limited developer
of AI-generated and AI-distributed lies. verifiable computation techniques, in par- support. In addition, safeguards need to be
Unfortunately, today’s approaches and ticular zero-knowledge proofs (ZKPs). These established against potential vulnerabilities.
tools may not be sufficient to battle disinfor- cryptographic proofs enable the delegation For example, research on the detection of
mation. Content moderation has limitations of generic computation — such as the verifica- re-captured images may help to prevent the
and whether stricter regulation of content tion of authentic sources or modifications — recording of edited scenes from a screen10.
providers will be effective is unclear2. AI-based to an untrusted third party who discloses only Content distributors, such as news outlets
detection is error-prone4 and will probably selected information and cryptographic evi- and social media platforms, need to estab-
remain so in the future, not least because dence for the correctness of the execution. lish policies for trustworthy sources and
generative AI algorithms can in response be ZKPs were originally invented in the 1980s but permitted modifications. Moreover, their
trained to evade these detection mechanisms5. recent investments in the cryptocurrency and consumers should be able to check whether
We consequently advocate for an extension blockchain space made them both powerful content sources and editing histories comply
of today’s toolkit against disinformation with and easier to implement. These improved con- with these policies. Policymakers must ensure
cryptographic techniques that help to estab- structions, known as zk-SNARKs, are (1) zero that new identity schemes support ZKP-based
lish machine-verifiable provenance for digital knowledge — that is, no information beyond authentication and the selective disclosure of
content. Our argument builds on a recent set what is explicitly demanded by the verifier is identity attributes without exposing unique
of specifications issued by the Coalition for shared about the computation (inputs, inter- identifiers. Consumers, in turn, must specifi-
Content Provenance and Authenticity (C2PA)6. mediary results and outputs can remain hidden); cally demand content with cryptographically
The C2PA promotes the use of cryptographic (2) succinct — that is, verification effort is very verifiable provenance.
techniques and secure hardware in cameras small; and (3) non-interactive — that is, the These complexities will also make it difficult
and microphones that enable these devices to same proof works for any number of verifiers. to eliminate disinformation completely with
digitally sign photos, sound, and video record- Despite proof generation still being compu- cryptography. Battling disinformation will still
ings. Some cameras, such as Sony’s Alpha 7 tationally demanding, zk-SNARKs now facilitate rely on diligent research of journalists and a com-
IV, already come with these capabilities. operations even on large image files9 and audio mitment to truth. But cryptography can re-level
Similar, albeit more comprehensive, digital streaming. They make it possible, for example, the playing field, making fabrication again more
identities for individuals and organizations to prove that an image was originally created difficult and economically less attractive.
can help to establish human provenance for and signed by a certified camera and that it was
content, including text, and single out bots. subsequently modified only in a certain way. If Johannes Sedlmeir1,
Such identities and the corresponding ‘trust explicitly required, content providers can also Alexander Rieger 1,2 , Tamara Roth1,2 &
infrastructures’ that map cryptographic keys include additional information in the proof, Gilbert Fridgen 1
to reputable organizations, including manu- such as the model of camera and the photog- 1
Interdisciplinary Centre for Security,
facturers or media companies, are already a rapher’s affiliations or attestations. Recursive Reliability and Trust, University of
strategic priority in Canada and Europe7. proof composition techniques even enable Luxembourg, Luxembourg, Luxembourg.
However, substantial problems with these sequential modifications by different editors 2
Sam M. Walton College of Business,
cryptographic techniques remain. First, every to be traced. Moreover, zk-SNARKs can provide University of Arkansas, Fayetteville, AR, USA.
edit of a text, an image, or a video invalidates strong assurances of human identities without e-mail: arieger@uark.edu
its digital signature and the corresponding the need to share unique cryptographic iden-
cryptographic trust that underpins verifiable tifiers or other sensitive identity attributes7. Published online: xx xx xxxx

nature machine intelligence


Correspondence

References 7. Rieger, A., Roth, T., Sedlmeir, J., Weigl, L. & Fridgen, G. 13342933 (to G.F.), as well as by the FNR through the PABLO
1. Lewandowsky, S., Ecker, U. K. H. & Cook, J. J. Appl. Res. Nat. Hum. Behav. 6, 3–3 (2021). project, grant reference 16326754.
Mem. Cogn. 6, 353–369 (2017). 8. Naveh, A. & Tromer, E. in Symposium on Security and
2. Menczer, F., Crandall, D., Ahn, Y.-Y. & Kapadia, A. Privacy 255–271 (IEEE, 2016). Competing interests
Nat. Mach. Intell. 5, 679–680 (2023). 9. Datta, T. & Boneh, D. Medium https://go.nature. J.S. and G.F. are supported by PayPal and the
3. Ienca, M. Topoi 42, 833–842 (2023). com/46tOJxt (2022). Luxembourg National Research Fund FNR. PayPal’s
4. Williams, R. MIT Technology Review https://go.nature.com/ 10. Chingovska, I., Anjos, A. & Marcel, S. in Int. financial support is administered via the FNR, and by
3EVb4Z0 (2023). Conf. Biometrics Special Interest Group 1–7 contractual agreement, PayPal has no involvement in
5. Boneh, D., Grotto, A. J., McDaniel, P. & Papernot, N. (IEEE, 2012). J.S. and G.F.’s research. A.R. and T.R. declare no competing
Stanford University Policy Briefs https://go.nature. interests.
com/3PDiVPT (2020). Acknowledgements
6. Coalition for Content Provenance and Authenticity. This research was funded in part by the Luxembourg National
https://c2pa.org/ (2023). Research Fund (FNR) and PayPal, PEARL grant reference

nature machine intelligence

You might also like