Bringing Deployable Key Transparency to End Users
نویسندگان
چکیده
We present CONIKS, an end-user key verification service capable of integration in end-to-end encrypted communication systems. CONIKS builds on related designs for transparency of web server certificates but solves several new challenges specific to key verification for end users. In comparison to prior designs, CONIKS enables more efficient monitoring and auditing of keys, allowing small organizations to effectively audit even very large key servers. CONIKS users can efficiently monitor their own key bindings for consistency, downloading less than 20 kB per day to do so even for a provider with billions of users. CONIKS users and providers can collectively audit providers for non-equivocation, and this requires downloading a constant 2.5 kB per day regardless of server size. Unlike any previous proposal, CONIKS also preserves the level of privacy offered by today’s major communication services, hiding the list of usernames present and even allowing providers to conceal the total number of users in the system.
منابع مشابه
CONIKS: Bringing Key Transparency to End Users
We present CONIKS, an end-user key verification service capable of integration in end-to-end encrypted communication systems. CONIKS builds on transparency log proposals for web server certificates but solves several new challenges specific to key verification for end users. CONIKS obviates the need for global third-party monitors and enables users to efficiently monitor their own key bindings ...
متن کاملEnhanced Certificate Transparency and End-to-End Encrypted Mail
The certificate authority model for authenticating public keys of websites has been attacked in recent years, and several proposals have been made to reinforce it. We develop and extend certificate transparency, a proposal in this direction, so that it efficiently handles certificate revocation. We show how this extension can be used to build a secure end-to-end email or messaging system using ...
متن کاملDeveloping Deployable Spoken Language Translation Systems given Limited Resources
Automatic machine translation systems in research institutions have reached a considerable level of performance. This is especially true for Statistical Machine Translation. Since its introduction in the 1990s, it has outperformed earlier approaches and produces a translation quality that seemed impossible only a short time ago. Particularly for limited domains like tourism dialogs, medical rel...
متن کاملAn Empirical Study of Textual Key-Fingerprint Representations
Many security protocols still rely on manual fingerprint comparisons for authentication. The most well-known and widely used key-fingerprint representation are hexadecimal strings as used in various security tools. With the introduction of end-to-end security in WhatsApp and other messengers, the discussion on how to best represent key-fingerprints for users is receiving a lot of interest. We c...
متن کاملLeading Johnny to Water: Designing for Usability and Trust
Although the means and the motivation for securing private messages and emails with strong end-to-end encryption exist, we have yet to see the widespread adoption of existing implementations. Previous studies have suggested that this is due to the lack of usability and understanding of existing systems such as PGP. A recent study by Ruoti et al. suggested that transparent, standalone encryption...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015