On Ends-to-Ends Encryption

نویسندگان

  • Cas Cremers
  • Luke Garratt
  • Jon Millican
  • Kevin Milner
چکیده

In the past few years secure messaging has become mainstream, with over a billion active users of end-to-end encryption protocols through apps such as WhatsApp, Signal, Facebook Messenger, Google Allo, Wire and many more. While these users’ two-party communications now enjoy very strong security guarantees, it turns out that many of these apps provide, without notifying the users, a weaker property for group messaging: an adversary who compromises a single group member can intercept communications indefinitely. One reason for this discrepancy in security guarantees is that most existing group messaging protocols are fundamentally synchronous, and thus cannot be used in the asynchronous world of mobile communications. In this paper we show that this is not necessary, presenting a design for a tree-based group key exchange protocol in which no two parties ever need to be online at the same time. Our design achieves strong security guarantees, in particular including post-compromise security. We give a computational security proof for our core design as well as a proof-of-concept implementation, showing that it scales efficiently even to large groups. Our results show that strong security guarantees for group messaging are achievable even in the modern, asynchronous setting, without resorting to using inefficient point-to-point communications for large groups. By building on standard and well-studied constructions, our hope is that many existing solutions can be applied while still respecting the practical constraints of mobile devices.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On trivial ends of Cayley graph of groups

‎In this paper, first we introduce the end of locally finite graphs as an equivalence class of infinite paths in the graph. Then we mention the ends of finitely generated groups using the Cayley graph. It was proved that the number of ends of groups are not depended on the Cayley graph and that the number of ends in the groups is equal to zero, one, two, or infinity. For ...

متن کامل

Application of Boundary Element Method to 3 D Submerged Structures With Open Ends (RESEARCH NOTE)

This paper presents a three dimensional application of direct Boundary-Element Method (BEM) for computing interaction of sinusoidal waves with a large submerged open bottom structure near the floor with finite depth. The wave diffraction problem is formulated within the framework of linearized potential theory and solved numerically with direct BEM. A computer program based on BEM is developed ...

متن کامل

Notes on some Distance-Based Invariants for 2-Dimensional Square and Comb Lattices

We present explicit formulae for the eccentric connectivity index and Wiener index of 2-dimensional square and comb lattices with open ends. The formulae for these indices of 2-dimensional square lattices with ends closed at themselves are also derived. The index for closed ends case divided by the same index for open ends case in the limit N →&infin defines a novel quantity we call compression...

متن کامل

Thermoelastic Analysis of Compressor Spool in Turbojet Engine and Redesign it Using Functionally Graded Materials with Opti-mal Coefficients

In this article, an exact analysis of compressors spool in a turbojet engine has been investigated. The spool is modeled as a rotating thick-walled hollow circular cylinder with free-clamp ends. It is subjected to centrifugal load due to its constant rotational speed, uniform internal and external radial loads and arbitrary thermal gradients. The analysis is initially investigated for the homog...

متن کامل

شبیه‌سازی انسان و اصل غایات کانت

Human cloning is one of the most controversial issues in ethics. This paper, with analytic-descriptive method, deals with Kant;aposs principle of ends and permission or prohibition of human cloning from its point of view. According to Kant;aposs principle of ends, any action in which humanity is taken as a means, not as an end, is prohibited. There are different interpretations of taking humani...

متن کامل

Design of new potent HTLV-1 protease inhibitors: in silico study

HTLV-1 and HIV-1 are two major causes for severe T-cell leukemia disease and acquired immune deficiency syndrome (AIDS). HTLV-1 protease, a member of aspartic acid protease family, plays important roles in maturation during virus replication cycle. The impairment of these proteases results in uninfectious HTLV-1virions.Similar to HIV-1protease deliberate mutations that confer drug resistance on...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017