If a court knows that a respondent knows the password to a device, can the court compel the respondent to enter that password into the device? In this work, we propose a new approach to the foregone conclusion doctrine from Fisher v US that governs the answer to this question. The Holy Grail of this line of work would be a framework for reasoning about whether the testimony implicit in any action is already known to the government. In this paper we attempt something narrower. We introduce a framework for specifying actions for which all implicit testimony is, constructively, a foregone conclusion. Our approach is centered around placing the burden of proof on the government to demonstrate that it is not "rely[ing] on the truthtelling" of the respondent. Building on original legal analysis and using precise computer science formalisms, we propose demonstrability as a new central concept for describing compelled acts. We additionally provide a language for whether a compelled action meaningfully entails the respondent to perform in a manner that is 'as good as' the government's desired goal. Then, we apply our definitions to analyze the compellability of several cryptographic primitives including decryption, multifactor authentication, commitment schemes, and hash functions. In particular, our framework reaches a novel conclusion about compelled decryption in the setting that the encryption scheme is deniable: the government can compel but the respondent is free to use any password of her choice.
翻译:如果法院知道被告知道装置的密码,法院能否强迫被告将密码输入装置?在这项工作中,我们建议对Fisher诉美国关于该问题答案的放弃结论理论采取新的方法。这一工作路线的神圣圣杯将是一个推理框架,说明政府是否已经知道任何行动中隐含的证词。在这份文件中,我们试图缩小范围。我们引入一个框架,说明所有隐含证词都具有建设性、具有先入为主的结论的行动。我们的方法是把举证责任放在政府身上,以证明它不是“重新讲述”被告的真相。在原始法律分析的基础上,并利用精确的计算机科学形式主义,我们建议妖魔化作为描述强迫行为的新核心概念。我们进一步提供一种语言,说明强制行动是否有意义地要求被告以“良好”的方式履行所有隐含的证词,这是政府的预期目标。然后,我们运用我们的定义来分析包括解密、多功能化在内的数个加密原始文件的可强制适用性,在政府中可以自由进行加密的密码化计划,在政府中可以做出这样的结论。