DENIABLE GROUP COMMUNICATIONS IN THE PRESENCE OF GLOBAL UNLIMITED ADVERSARY

被引:1
作者
Sheidaev, V. F. [1 ]
Gamayunov, D. Y. [2 ]
机构
[1] Lomonosov Moscow State Univ, Moscow, Russia
[2] Natl Res Univ, Higher Sch Econ, Moscow, Russia
来源
PRIKLADNAYA DISKRETNAYA MATEMATIKA | 2018年 / 40期
关键词
secure communications; decentralised communications; deniability;
D O I
10.17223/20710410/40/6
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
With this paper, we provide our research into the problem of secure communications in the presence of a global unlimited adversary. As a solution, we propose to use decentralised deniable communications. We have made use of our existing multi-party Off-the-Record protocol's modification which is able to function over decentralised transport. Its Perfect Forward Secrecy (PFS) features were improved by adding Key Ratcheting procedure to the protocol's flow. As a result, we propose a fully decentralised cryptosystem which has deniability and transcript consistency features, improved PFS and ability to resist the Sybil attack. We also give a detailed overview of the protocol model implementation in JavaScript designed to function in conditions of centralized server's absence.
引用
收藏
页码:72 / 86
页数:15
相关论文
共 19 条
[1]   Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice [J].
Adrian, David ;
Bhargavan, Karthikeyan ;
Durumeric, Zakir ;
Gaudry, Pierrick ;
Green, Matthew ;
Halderman, J. Alex ;
Heninger, Nadia ;
Springall, Drew ;
Thome, Emmanuel ;
Valenta, Luke ;
VanderSloot, Benjamin ;
Wustrow, Eric ;
Zanella-Beguelin, Santiago ;
Zimmermann, Paul .
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, :5-17
[2]  
Alexander C, 2007, WPES'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON PRIVACY IN ELECTRONIC SOCIETY, P41
[3]  
Borisov N., 2004, P 2004 ACM WORKSHOP, P77
[4]   A secure and scalable group key exchange system [J].
Burmester, M ;
Desmedt, Y .
INFORMATION PROCESSING LETTERS, 2005, 94 (03) :137-143
[5]  
Danezis G, 2005, LECT NOTES COMPUT SC, V3679, P305
[6]   The Sybil attack [J].
Douceur, JR .
PEER-TO-PEER SYSTEMS, 2002, 2429 :251-260
[7]  
Goldberg I, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P358
[8]  
Hornby T, 2016, SIDE CHANNEL ATTACKS
[9]  
Korosteleva M. V., 2014, PROBLEMY INFORM BEZO, P74
[10]  
Lesniewski-Laas C., 2010, P NSDI 10 APR, P111