Strongvelope Multi-Party Encrypted Messaging Protocol design document
نویسنده
چکیده
To give a non-legal human-readable summary of (and not a substitute for) the license, you are free to: • Share – copy and redistribute the material in any medium or format • Adapt – remix, transform, and build upon the material for any purpose, even commercially. The licensor cannot revoke these freedoms as long as you follow the license terms: • Attribution – You must give appropriate credit, provide a link to the license, and indicate if changes were made; but not in any way that suggests the licensor endorses you or your use. • ShareAlike – If you distribute your adaptions of the material, you must do this under the same license as the original. You may not apply additional restrictions when doing so, legal or technical. No warranties are given. Other legal rights may extend (e.g. fair use and fair dealing) or restrict (e.g. publicity, privacy, or moral rights) your permission to use this material, outside of the freedoms given by this license.
منابع مشابه
mpENC Multi-Party Encrypted Messaging Protocol design document
This document is a technical overview and discussion of our work, a protocol for secure group messaging. By secure we mean for the actual users i.e. end-to-end security, as opposed to " secure " for irrelevant third parties. Our work provides everything needed to run a messaging session between real users on top of a real transport protocol. That is, we specify not just a key exchange, but when...
متن کاملSecure Multi-party Computation Using Virtual Parties for Computation on Encrypted Data
In this paper, we propose a new Virtual Party Protocol (VPP) protocol for Secure Multi-Party Computation (SMC). There are many computations and surveys which involve confidential data from many parties or organizations. As the concerned data is property of the organization or the party, preservation and security of this data is of prime importance for such type of computations. Although the com...
متن کاملOptimizing One Fair Document Exchange Protocol
This paper presents an efficient fair document exchange protocol. The exchange of the documents will be between two parties. The protocol is based on the verifiable and recoverable encryption of a document’s key. This verifiable and recoverable encryption of the document’s key will allow one party to verify the encrypted key. It will also ensure this party that the Semi Trusted Third Party will...
متن کاملBehavioral Identification of Trusted Third Party in Secure Multiparty Computing Protocol
We present a solution for identification and reduction of malicious conduct by Trusted Third parties (TTPs) in Secure Multiparty Computing Protocol. This paper also proposes a secured protocol for computation and defines encryption to be performed before sending inputs for computation. Our protocol uses eenvelopes for sharing keys between parties and TTPs. This key sharing is done on the basis ...
متن کاملSecure Multi-party Computation Minimizing Online Rounds
Multi-party secure computations are general important procedures to compute any function while keeping the security of private inputs. In this work we ask whether preprocessing can allow low latency (that is, small round) secure multi-party protocols that are universally-composable (UC). In particular, we allow any polynomial time preprocessing as long as it is independent of the exact circuit ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1606.04593 شماره
صفحات -
تاریخ انتشار 2016