DENIABLE GROUP COMMUNICATIONS IN THE PRESENCE OF GLOBAL UNLIMITED ADVERSARY

被引:1
|
作者
Sheidaev, V. F. [1 ]
Gamayunov, D. Y. [2 ]
机构
[1] Lomonosov Moscow State Univ, Moscow, Russia
[2] Natl Res Univ, Higher Sch Econ, Moscow, Russia
来源
关键词
secure communications; decentralised communications; deniability;
D O I
10.17223/20710410/40/6
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
With this paper, we provide our research into the problem of secure communications in the presence of a global unlimited adversary. As a solution, we propose to use decentralised deniable communications. We have made use of our existing multi-party Off-the-Record protocol's modification which is able to function over decentralised transport. Its Perfect Forward Secrecy (PFS) features were improved by adding Key Ratcheting procedure to the protocol's flow. As a result, we propose a fully decentralised cryptosystem which has deniability and transcript consistency features, improved PFS and ability to resist the Sybil attack. We also give a detailed overview of the protocol model implementation in JavaScript designed to function in conditions of centralized server's absence.
引用
收藏
页码:72 / 86
页数:15
相关论文
共 50 条
  • [21] Minimum Variance Unbiased Estimation in the Presence of an Adversary
    Chen, Kewei
    Gupta, Vijay
    Huang, Yih-Fang
    2017 IEEE 56TH ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2017,
  • [22] A Deniable Group Key Establishment Protocol in the Standard Model
    Zhang, Yazhe
    Wang, Kunpeng
    Li, Bao
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2010, 6047 : 308 - 323
  • [23] Designated Verifier Proxy Re-signature for Deniable and Anonymous Wireless Communications
    Jiannan Wei
    Guomin Yang
    Yi Mu
    Wireless Personal Communications, 2017, 97 : 3017 - 3030
  • [24] Designated Verifier Proxy Re-signature for Deniable and Anonymous Wireless Communications
    Wei, Jiannan
    Yang, Guomin
    Mu, Yi
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 97 (02) : 3017 - 3030
  • [25] ADVERSARY SYSTEM IN MARRIED COUPLES GROUP THERAPY
    EVERETT, HC
    INTERNATIONAL JOURNAL OF GROUP PSYCHOTHERAPY, 1968, 18 (01) : 70 - 74
  • [26] Round-Optimal Deniable Ring Authentication in the Presence of Big Brother
    Dowsley, Rafael
    Hanaoka, Goichiro
    Imai, Hideki
    Nascimento, Anderson C. A.
    INFORMATION SECURITY APPLICATIONS, 2011, 6513 : 307 - +
  • [27] Characterization of untrusted relaying networks in the presence of an adversary jammer
    Saedi, Hamed
    Mohammadi, Abbas
    Kuhestani, Ali
    WIRELESS NETWORKS, 2020, 26 (03) : 2113 - 2124
  • [28] The bounded-storage model in the presence of a quantum adversary
    Koenig, Robert T.
    Terhal, Barbara A.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (02) : 749 - 762
  • [29] A Consideration on the Transformation from Deniable Group Signature to Disavowable PKENO
    Ishida, Ai
    Sakai, Yusuke
    Hanaoka, Goichiro
    PROCEEDINGS OF 2018 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA2018), 2018, : 85 - 89
  • [30] Communication Efficient Secret Sharing in the Presence of Malicious Adversary
    Bitar, Rawad
    Jaggi, Sidharth
    2020 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2020, : 548 - 553