On Ends-to-Ends Encryption
نویسندگان
چکیده
In the past few years secure messaging has become mainstream, with over a billion active users of end-to-end encryption protocols through apps such as WhatsApp, Signal, Facebook Messenger, Google Allo, Wire and many more. While these users’ two-party communications now enjoy very strong security guarantees, it turns out that many of these apps provide, without notifying the users, a weaker property for group messaging: an adversary who compromises a single group member can intercept communications indefinitely. One reason for this discrepancy in security guarantees is that most existing group messaging protocols are fundamentally synchronous, and thus cannot be used in the asynchronous world of mobile communications. In this paper we show that this is not necessary, presenting a design for a tree-based group key exchange protocol in which no two parties ever need to be online at the same time. Our design achieves strong security guarantees, in particular including post-compromise security. We give a computational security proof for our core design as well as a proof-of-concept implementation, showing that it scales efficiently even to large groups. Our results show that strong security guarantees for group messaging are achievable even in the modern, asynchronous setting, without resorting to using inefficient point-to-point communications for large groups. By building on standard and well-studied constructions, our hope is that many existing solutions can be applied while still respecting the practical constraints of mobile devices.
منابع مشابه
On trivial ends of Cayley graph of groups
In this paper, first we introduce the end of locally finite graphs as an equivalence class of infinite paths in the graph. Then we mention the ends of finitely generated groups using the Cayley graph. It was proved that the number of ends of groups are not depended on the Cayley graph and that the number of ends in the groups is equal to zero, one, two, or infinity. For ...
متن کاملApplication of Boundary Element Method to 3 D Submerged Structures With Open Ends (RESEARCH NOTE)
This paper presents a three dimensional application of direct Boundary-Element Method (BEM) for computing interaction of sinusoidal waves with a large submerged open bottom structure near the floor with finite depth. The wave diffraction problem is formulated within the framework of linearized potential theory and solved numerically with direct BEM. A computer program based on BEM is developed ...
متن کاملNotes on some Distance-Based Invariants for 2-Dimensional Square and Comb Lattices
We present explicit formulae for the eccentric connectivity index and Wiener index of 2-dimensional square and comb lattices with open ends. The formulae for these indices of 2-dimensional square lattices with ends closed at themselves are also derived. The index for closed ends case divided by the same index for open ends case in the limit N →&infin defines a novel quantity we call compression...
متن کاملThermoelastic Analysis of Compressor Spool in Turbojet Engine and Redesign it Using Functionally Graded Materials with Opti-mal Coefficients
In this article, an exact analysis of compressors spool in a turbojet engine has been investigated. The spool is modeled as a rotating thick-walled hollow circular cylinder with free-clamp ends. It is subjected to centrifugal load due to its constant rotational speed, uniform internal and external radial loads and arbitrary thermal gradients. The analysis is initially investigated for the homog...
متن کاملشبیهسازی انسان و اصل غایات کانت
Human cloning is one of the most controversial issues in ethics. This paper, with analytic-descriptive method, deals with Kant;aposs principle of ends and permission or prohibition of human cloning from its point of view. According to Kant;aposs principle of ends, any action in which humanity is taken as a means, not as an end, is prohibited. There are different interpretations of taking humani...
متن کاملDesign of new potent HTLV-1 protease inhibitors: in silico study
HTLV-1 and HIV-1 are two major causes for severe T-cell leukemia disease and acquired immune deficiency syndrome (AIDS). HTLV-1 protease, a member of aspartic acid protease family, plays important roles in maturation during virus replication cycle. The impairment of these proteases results in uninfectious HTLV-1virions.Similar to HIV-1protease deliberate mutations that confer drug resistance on...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017