Главная
Study mode:
on
1
Intro
2
Major Effort: E2E-Encrypted Messaging
3
Man-in-the-Middle Attacks
4
The User-to-User Setting
5
User-to-User Bounds
6
This Talk: The Group Setting
7
Our Contributions
8
Correctness & Security
9
The Naïve Protocol
10
Our Computationally-Secure Protocol
11
Example: One Possible Attack
12
Concurrent Non-Malleable Commitments
13
Our Statistical Lower Bound
14
Protocol Structure
15
Understanding H(E)
Description:
Explore a presentation from Crypto 2018 on out-of-band authentication in group messaging, focusing on computational, statistical, and optimal aspects. Delve into the paper by Lior Rotem and Gil Segev, which addresses end-to-end encrypted messaging, man-in-the-middle attacks, and user-to-user settings. Examine the group setting, correctness and security measures, and the proposed computationally-secure protocol. Investigate concurrent non-malleable commitments, statistical lower bounds, and protocol structures. Gain insights into the challenges and solutions for secure group messaging authentication.

Out of Band Authentication in Group Messaging - Computational, Statistical, Optimal

TheIACR
Add to list
0:00 / 0:00