8 Hits in 6.9 sec

Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake

Jacqueline Brendel, Rune Fiedler, Felix Günther, Christian Janson, Douglas Stebila, Goichiro Hanaoka, Junji Shikata, Yohei Watanabe
In this paper, we show how to construct asynchronous deniable key exchange by combining KEMs and designated verifier signature (DVS) schemes, matching the characteristics of Signal.  ...  The key exchange protocol that establishes initial shared secrets in the handshake of the Signal end-to-end encrypted messaging protocol has several important characteristics: (1) it runs asynchronously  ...  Acknowledgements We thank Shuichi Katsumata and the anonymous reviewers of PKC 2022 for the helpful comments.  ... 
doi:10.3929/ethz-b-000520264 fatcat:nyqwmst4djbgxhwrzws74qqdn4

Improved Strongly Deniable Authenticated Key Exchanges for Secure Messaging

Nik Unger, Ian Goldberg
2018 Proceedings on Privacy Enhancing Technologies  
Our constructions are nearly as efficient as key exchanges with weaker deniability, such as the ones used by the popular OTR and Signal protocols.  ...  In this work, we propose three new strongly deniable key exchange protocols—DAKEZ, ZDH, and XZDH—that are designed to be used in modern secure messaging applications while eliminating the weaknesses of  ...  Acknowledgments The authors would like to thank Makulf Kohlweiss and the anonymous reviewers for their insightful comments and feedback, Alfredo Rial Duran for his exceptionally detailed verification of  ... 
doi:10.1515/popets-2018-0003 dblp:journals/popets/UngerG18 fatcat:w4k3paha5zcgvkj46gs33zwe4i

Security and privacy of secure messaging services : a case study of wire

Andreas Boll, Edgar Weippl, Georg Merzdovnik
compared to Signal and (3) how much metadata does Wire expose?  ...  For this, a case study of Wire was conducted and compared to other services i.e. Signal.  ...  In order to exchange short-lived signature keys, the key exchange creates a confidential, authentic and deniable communication channel between each participant respectively.  ... 
doi:10.34726/hss.2020.41015 fatcat:ut2pcs5marhntcyuslqvf2gv44

COVI White Paper [article]

Hannah Alsdurf, Edmond Belliveau, Yoshua Bengio, Tristan Deleu, Prateek Gupta, Daphne Ippolito, Richard Janda, Max Jarvie, Tyler Kolody, Sekoul Krastev, Tegan Maharaj, Robert Obryk (+12 others)
2020 arXiv   pre-print
The estimated risk can provide early risk awareness, personalized recommendations and relevant information to the user.  ...  Machine learning methods can circumvent some of the limitations of standard digital tracing by incorporating many clues and their uncertainty into a more graded and precise estimation of infection risk  ...  and signals sent to other users so they can update their own risk assessment.  ... 
arXiv:2005.08502v2 fatcat:vnfhe3bsazdpdftg5ce5koqd74

Proceedings of the Seminar Innovative Internet Technologies and Mobile Communications (IITM), Summer Semester 2020

Georg Carle, Stephan Günther, Benedikt Jaeger, Chair Of Network Architectures
Both seminars share the same contents and differ only in their duration.  ...  For this semester the arwards where given to Bernhard Vorhofer with the paper Extending ZMap: Round-Trip Time Measurement via ICMP and TCP and Simon Bachmeier with the paper Network Simulation with OMNet  ...  They then calculate a HMAC c i over all the data that has been generated and exchanged during the handshake, utilizing k as key.  ... 
doi:10.2313/net-2020-11-1 fatcat:7og3fpqf5zfpfldmtsp57bbcg4

Online) International Journal of Network Security is published both in traditional paper form

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+102 others)
2016 International Journal of Network Security   unpublished
Lightweight trust mechanism with lightweight cryptography primitives and post-quantum cryptosystems are having important concerns in resource constraint wireless sensor based Mobile Ad Hoc Networks (MANETs  ...  In post-quantum cryptosystems, error correcting codes (ECC) help in code based cryptography for lightweight identification , authentication, distance bounding and tag with ownership transfer protocols  ...  Acknowledgments The authors would like to thank the anonymous reviewers and the editor for their comments that will help them to improve this paper.  ... 

Privacy and Data Protection by Design - from policy to engineering [article]

George Danezis, Josep Domingo-Ferrer, Marit Hansen, Jaap-Henk Hoepman, Daniel Le Metayer, Rodica Tirtea, Stefan Schiffner
2015 arXiv   pre-print
Furthermore, the report reflects limitations of the approach. It concludes with recommendations on how to overcome and mitigate these limits.  ...  There have been decades of debate on how those values -and legal obligations- can be embedded into systems, preferably from the very beginning of the design process.  ...  While we cannot name all, we would like to thank Sébastien Gambs and Rosa Barcelo for their feedback on drafts of this report.  ... 
arXiv:1501.03726v1 fatcat:csxvtyiiprhodnquaigppcwbwi

MessageVortex Transport Independent, Unobservable, and Unlinkable Messaging

Martin Gwerder
Tschudin and the University of Basel for the opportunity of writing this work and for the challenges they posed me, allowing me to grow. Dr.  ...  No additional protocol-specific infrastructure is required in public networks and allows a sender to control all aspects of a message, such as the degree of anonymity, timing, and redundancy of the message  ...  Thinking is the hardest work there is, which is probably the reason, so few engage in it. Henry Ford, American industrialist and founder of Ford Motor Co.  ... 
doi:10.5451/unibas-ep84631 fatcat:rsg5cjuzrvex7a2lrcnuldtuqa