Deniable Key Exchanges for Secure Messaging

@inproceedings{Unger2015DeniableKE,
  title={Deniable Key Exchanges for Secure Messaging},
  author={Nik Unger and Ian Goldberg},
  booktitle={ACM Conference on Computer and Communications Security},
  year={2015}
}
In the wake of recent revelations of mass government surveillance, secure messaging protocols have come under renewed scrutiny. A widespread weakness of existing solutions is the lack of strong deniability properties that allow users to plausibly deny sending messages or participating in conversations if the security of their communications is later compromised. Deniable authenticated key exchanges (DAKEs), the cryptographic protocols responsible for providing deniability in secure messaging… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 10 CITATIONS

Circumventing Cryptographic Deniability with Remote Attestation

VIEW 5 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

On The Use of Remote Attestation to Break and Repair Deniability

  • IACR Cryptology ePrint Archive
  • 2018
VIEW 4 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

A Formal Security Analysis of the Signal Messaging Protocol

  • 2017 IEEE European Symposium on Security and Privacy (EuroS&P)
  • 2016
VIEW 1 EXCERPT
CITES BACKGROUND

References

Publications referenced by this paper.
SHOWING 1-8 OF 8 REFERENCES

Universally composable one-time signature and broadcast authentication

  • Science China Information Sciences
  • 2010
VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL

The Pairing-Based Cryptography Library

B. Lynn
  • https://crypto.stanford.edu/pbc/
  • 2006
VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL

Better than BiBa: Short One-time Signatures with Fast Signing and Verifying

  • IACR Cryptology ePrint Archive
  • 2002
VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL

Efficient signature generation by smart cards

  • Journal of Cryptology
  • 1991
VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL