Blockchain-enabled End-to-End Encryption for Instant Messaging Applications
@article{Singh2021BlockchainenabledEE, title={Blockchain-enabled End-to-End Encryption for Instant Messaging Applications}, author={Raman Singh and Ark Nandan Singh Chauhan and Hitesh Tewari}, journal={2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)}, year={2021}, pages={501-506} }
In this era of ubiquitous social media and messaging applications, users are becoming increasingly aware of the data privacy issues associated with such apps. Major messaging applications are moving towards end-to-end encryption (E2EE) to give their users the privacy they are demanding. However the current security mechanisms employed by different service providers are not unfeigned E2EE implementations, and are blended with many vulnerabilities. At present, the major part of the E2EE mechanism…
2 Citations
Uncuffed: A Blockchain-based Secure Messaging System
- Computer SciencePCI
- 2021
The blockchain technology is proposed in this article for a simulation messaging platform based on the Bitcoin protocol to prevent personal data leakage, and the selected mechanism takes advantage of the data storage decentralization of blockchain, and provides private interchange of secure messages and images.
Comparison of Rabin-P And Rabin Takagi Encryption Schemes on IoT Platform
- Computer Science, Mathematics2022 IEEE Symposium on Wireless Technology & Applications (ISWTA)
- 2022
Rabin-p is faster than Rabin-Takagi for encrypting and decrypting data, according to the findings obtained, and it is possible to infer that Rabin's runtime and performance on a microprocessor architecture outperforms the Rabin, Takagi cryptosystem on the microprocessor platform.
References
SHOWING 1-6 OF 6 REFERENCES
SINGLETON: A lightweight and secure end-to-end encryption protocol for the sensor networks in the Internet of Things based on cryptographic ratchets
- Computer ScienceThe Journal of Supercomputing
- 2020
The design and analysis demonstrate that Singleton security architecture can be easily integrated into existing network protocols such as IEEE 802.15.4 or OMA LWM2M, which offers several benefits that existing approaches cannot offer both performance and important security services.
X509Cloud — Framework for a ubiquitous PKI
- Computer ScienceMILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)
- 2017
The X509Cloud framework is proposed which enables organizations to issue certificates to their users at zero cost, and allows them to securely store and disseminate client certificates using the Bitcoin inspired blockchain protocol, which will enable organizations and individuals to authenticate and to securely communicate with other users on the Internet.
More is Less: On the End-to-End Security of Group Chats in Signal, WhatsApp, and Threema
- Computer Science2018 IEEE European Symposium on Security and Privacy (EuroS&P)
- 2018
A comprehensive and realistic security model is provided that reveals that strong security properties, such as Future Secrecy, which is a core part of the one-to-one communication in the Signal protocol, do not hold for its group communication.
Implementing Signal’s Double Ratchet algorithm”, https://nfil.dev/coding/encryption/python/double-ratchet-example/, Last accessed on 11-04-2022
- 2022