Deniable Key Exchanges for Secure Messaging

作者: Nik Unger , Ian Goldberg

DOI: 10.1145/2810103.2813616

关键词:

摘要: In the wake of recent revelations mass government surveillance, secure messaging protocols have come under renewed scrutiny. A widespread weakness existing solutions is lack strong deniability properties that allow users to plausibly deny sending messages or participating in conversations if security their communications later compromised. Deniable authenticated key exchanges (DAKEs), cryptographic responsible for providing applications, cannot currently provide all desirable simultaneously. We introduce two new DAKEs with provable and Generalized Universal Composability framework. Our primary contribution introduction Spawn, first non-interactive DAKE offers forward secrecy achieves against both offline online judges; Spawn can be used improve popular TextSecure application. also an interactive dual-receiver cryptosystem performance only competitive properties. To encourage adoption, we implement evaluate our schemes while relying solely on standard-model assumptions.

参考文章(139)
Carl M. Ellison, Establishing identity without certification authorities usenix security symposium. pp. 7- 7 ,(1996)
Roger Dingledine, Nathan S. Evans, Christian Grothoff, A practical congestion attack on tor using long paths usenix security symposium. pp. 33- 50 ,(2009)
Martin Petraschek, Helmut Hlavacs, Thomas Hoeher, Wilfried N. Gansterer, Oliver Jung, Security and Usability Aspects of Man-in-the-Middle Attacks on ZRTP Journal of Universal Computer Science. ,vol. 14, pp. 673- 692 ,(2008)
Michèle Feltz, Cas J. F. Cremers, One-round strongly secure key exchange with perfect forward secrecy and deniability IACR Cryptology ePrint Archive. ,vol. 2011, pp. 300- ,(2011) , 10.3929/ETHZ-A-006519221
Alexander Ulrich, Ralph Holz, Peter Hauck, Georg Carle, Investigating the OpenPGP Web of Trust Computer Security – ESORICS 2011. pp. 489- 507 ,(2011) , 10.1007/978-3-642-23822-2_27
Leslie Lamport, Constructing Digital Signatures from a One Way Function SRI International. ,(2016)
Nikos Triandopoulos, Apu Kapadia, Halo: High-Assurance Locate for Distributed Hash Tables. network and distributed system security symposium. ,(2008)
Sherman S. M. Chow, Matthew Franklin, Haibin Zhang, Practical Dual-Receiver Encryption Cryptographers’ Track at the RSA Conference. pp. 85- 105 ,(2014) , 10.1007/978-3-319-04852-9_5
Matthias Wachs, Martin Schanzenbach, Christian Grothoff, A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System cryptology and network security. pp. 127- 142 ,(2014) , 10.1007/978-3-319-12280-9_9