Anonymous Whistleblowing over Authenticated Channels
نویسندگان
چکیده
منابع مشابه
Secure Communications over Insecure Channels Based on Short Authenticated Strings
We propose a way to establish peer-to-peer authenticated communications over an insecure channel by using an extra channel which can authenticate very short strings, e.g. 15 bits. We call this SAS-based authentication as for authentication based on Short Authenticated Strings. The extra channel uses a weak notion of authentication in which strings cannot be forged nor modified, but whose delive...
متن کاملSecure Communications over Insecure Channels Using an Authenticated Channel
A secure peer-to-peer communication over an insecure channel without any prior exchanged key can be established with the help of an authentication step to exchange a public key. Then, standard methods of public-key cryptography such as RSA can be used to communicate securely. In this work, we concentrate on message authentication protocols which require an extra authenticated channel. We start ...
متن کاملThreshold Anonymous Password - Authenticated Key Exchange Protocol ?
At Indocrypt 2005, Viet et al., [22] have proposed an anonymous password-authenticated key exchange (PAKE) protocol and its threshold construction both of which are designed for client’s password-based authentication and anonymity against a passive server, who does not deviate the protocol. In this paper, we first point out that their threshold construction is completely insecure against off-li...
متن کاملQuasi-anonymous Channels
Although both anonymity and covert channels are part of the larger topic of information hiding, there also exists an intrinsic linkage between anonymity and covert channels. This linkage was illustrated in [1]; however, [1] just scratched the surface of the interplay between covert channels and anonymity, without a formal analysis of the related issues. This paper begins the process of formaliz...
متن کاملPolicy-Based Anonymous Channels
In view of the legislations on privacy, we address the issue of limiting non-technical responsibility of the administrators of a computer network. A primary concern regards the anonymity of channels within a local network. Solutions proposed in the literature increase significantly the traffic. In this paper we argue that it is possible to implement anonymous and private channels in a local net...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Lecture Notes in Computer Science
سال: 2022
ISSN: ['1611-3349', '0302-9743']
DOI: https://doi.org/10.1007/978-3-031-22365-5_24