Strongvelope Multi-Party Encrypted Messaging Protocol design document

نویسنده

  • Guy Kloss
چکیده

To give a non-legal human-readable summary of (and not a substitute for) the license, you are free to: • Share – copy and redistribute the material in any medium or format • Adapt – remix, transform, and build upon the material for any purpose, even commercially. The licensor cannot revoke these freedoms as long as you follow the license terms: • Attribution – You must give appropriate credit, provide a link to the license, and indicate if changes were made; but not in any way that suggests the licensor endorses you or your use. • ShareAlike – If you distribute your adaptions of the material, you must do this under the same license as the original. You may not apply additional restrictions when doing so, legal or technical. No warranties are given. Other legal rights may extend (e.g. fair use and fair dealing) or restrict (e.g. publicity, privacy, or moral rights) your permission to use this material, outside of the freedoms given by this license.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

mpENC Multi-Party Encrypted Messaging Protocol design document

This document is a technical overview and discussion of our work, a protocol for secure group messaging. By secure we mean for the actual users i.e. end-to-end security, as opposed to " secure " for irrelevant third parties. Our work provides everything needed to run a messaging session between real users on top of a real transport protocol. That is, we specify not just a key exchange, but when...

متن کامل

Secure Multi-party Computation Using Virtual Parties for Computation on Encrypted Data

In this paper, we propose a new Virtual Party Protocol (VPP) protocol for Secure Multi-Party Computation (SMC). There are many computations and surveys which involve confidential data from many parties or organizations. As the concerned data is property of the organization or the party, preservation and security of this data is of prime importance for such type of computations. Although the com...

متن کامل

Optimizing One Fair Document Exchange Protocol

This paper presents an efficient fair document exchange protocol. The exchange of the documents will be between two parties. The protocol is based on the verifiable and recoverable encryption of a document’s key. This verifiable and recoverable encryption of the document’s key will allow one party to verify the encrypted key. It will also ensure this party that the Semi Trusted Third Party will...

متن کامل

Behavioral Identification of Trusted Third Party in Secure Multiparty Computing Protocol

We present a solution for identification and reduction of malicious conduct by Trusted Third parties (TTPs) in Secure Multiparty Computing Protocol. This paper also proposes a secured protocol for computation and defines encryption to be performed before sending inputs for computation. Our protocol uses eenvelopes for sharing keys between parties and TTPs. This key sharing is done on the basis ...

متن کامل

Secure Multi-party Computation Minimizing Online Rounds

Multi-party secure computations are general important procedures to compute any function while keeping the security of private inputs. In this work we ask whether preprocessing can allow low latency (that is, small round) secure multi-party protocols that are universally-composable (UC). In particular, we allow any polynomial time preprocessing as long as it is independent of the exact circuit ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1606.04593  شماره 

صفحات  -

تاریخ انتشار 2016