IBE-Signal: Reshaping Signal into a MITM-Attack-Resistant Protocol
نویسندگان
چکیده
The Signal Protocol is one of the most popular privacy protocols today for protecting Internet chats and supports end-to-end encryption. Nevertheless, despite its many advantages, not resistant to Man-In-The-Middle (MITM) attacks because a malicious server can distribute forged identity-based public keys during user registration phase. To address this problem, we proposed IBE-Signal scheme that replaced Extended Triple Diffie–Hellman (X3DH) key agreement protocol with enhanced Identity-Based Encryption (IBE). Specifically, adoption verifiable parameter initialization ensures authenticity system parameters. At same time, Signature (IBS) enables our support mutual authentication. Moreover, distributed generation mechanism served as risk decentralization mitigate IBE’s escrow problem. Besides, revocable IBE used revocation Notably, IND-ID-CPA security proven under random oracle model. Compared existing schemes, provided new features authentication, perfect forward secrecy, post-compromise security, revocation. Experiments showed computational overhead lower than other schemes when Cloud Privacy Centers (CPCs) number less 8.
منابع مشابه
An Improved Key Exchange Protocol for WLAN That Can Resist MITM Attack Which Benefit from RTT
By the advancing of microelectronics, we propose an improved version of Aydos’s protocol, which uses the restraint of RTT. The new protocol can resist two types of MITM attack that presented by Mangipudi and Liu. It can even resist the strengthened MITM attack in which the attacker has infinite computing resource. We then analyse the new protocol both theoretical and experimental.
متن کاملTranslating Signal Flowcharts into Microcode for Custom Digital Signal Processors†
The retargetable microcode compiler CBC suited for application specific DSP (ASDSP) system software development is presented. The compiler is capable of generating code for various single instruction architectures. During the retargeting of the compiler a formal description of the target machine is analyzed in order to extract the machine-specific information needed for code generation. The tas...
متن کاملNote of Multidimensional MITM Attack on 25-Round TWINE-128
TWINE is a lightweight block cipher proposed in SAC 2012 by Suzaki et al.. TWINE operates on 64-bit block and supports 80 or 128bit key, denoted as TWINE-80 and TWINE-128 respectively. TWINE has attracted some attention since its publication and its security has been analyzed against several cryptanalytic techniques in both singlekey and related-key settings. In the single-key setting, the best...
متن کاملA Time-Frequency approach for EEG signal segmentation
The record of human brain neural activities, namely electroencephalogram (EEG), is generally known as a non-stationary and nonlinear signal. In many applications, it is useful to divide the EEGs into segments within which the signals can be considered stationary. Combination of empirical mode decomposition (EMD) and Hilbert transform, called Hilbert-Huang transform (HHT), is a new and powerful ...
متن کاملSignal Identification Using a New High Efficient Technique
Automatic signal type identification (ASTI) is an important topic for both the civilian and military domains. Most of the proposed identifiers can only recognize a few types of digital signal and usually need high levels of SNRs. This paper presents a new high efficient technique that includes a variety of digital signal types. In this technique, a combination of higher order moments and hi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Security and Communication Networks
سال: 2022
ISSN: ['1939-0122', '1939-0114']
DOI: https://doi.org/10.1155/2022/8653453