On active attack detection in messaging with immediate decryption
From MaRDI portal
Publication:6190117
DOI10.1007/978-3-031-38551-3_12MaRDI QIDQ6190117
Simone Colombo, Khashayar Barooti, Serge Vaudenay, Daniel Collins, Loïs Huguenin-Dumittan
Publication date: 6 February 2024
Published in: Advances in Cryptology – CRYPTO 2023 (Search for Journal in Brave)
Full work available at URL: https://infoscience.epfl.ch/record/304712/files/2023-880.pdf
Cryptography (94A60) Theory of compilers and interpreters (68N20) Data encryption (aspects in computer science) (68P25) Signal theory (characterization, reconstruction, filtering, etc.) (94A12)
Cites Work
- Unnamed Item
- Towards bidirectional ratcheted key exchange
- Optimal channel security against fine-grained state compromise: the safety of messaging
- Ratcheted encryption and key exchange: the security of messaging
- Yes, there is an oblivious RAM lower bound!
- Beyond security and efficiency: on-demand ratcheting with security awareness
- Security analysis and improvements for the IETF MLS standard for group messaging
- On the price of concurrency in group ratcheting protocols
- Continuous group key agreement with active security
- A formal security analysis of the Signal messaging protocol
- The double ratchet: security notions, proofs, and modularization for the Signal protocol
- Efficient ratcheting: almost-optimal guarantees for secure messaging
- Determining the core primitive for optimally secure ratcheting
- Secure Multi-Party Computation with Identifiable Abort
- Lower Bounds for Oblivious Data Structures
- Topics in Cryptology – CT-RSA 2006
- Advances in Cryptology - ASIACRYPT 2003
- A more complete analysis of the signal double ratchet algorithm
- On the insider security of MLS
- Continuous authentication in secure messaging
- On the worst-case inefficiency of CGKA
- On secure ratcheting with immediate decryption
- Strongly anonymous ratcheted key exchange
- Bidirectional Asynchronous Ratcheted Key Agreement with Linear Complexity
This page was built for publication: On active attack detection in messaging with immediate decryption