End-to-End Encrypted Zoom Meetings: Proving Security and Strengthening Liveness

被引:1
|
作者
Dodis, Yevgeniy [1 ]
Jost, Daniel [1 ]
Kesavan, Balachandar [2 ]
Marcedone, Antonio [2 ]
机构
[1] NYU, New York, NY USA
[2] Zoom Video Commun, San Jose, CA 95113 USA
关键词
KEY-ENCAPSULATION; EFFICIENT; STANDARD;
D O I
10.1007/978-3-031-30589-4_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In May 2020, Zoom Video Communications, Inc. (Zoom) announced a multi-step plan to comprehensively support end-to-end encrypted (E2EE) group video calls and subsequently rolled out basic E2EE support to customers in October 2020. In this work we provide the first formal security analysis of Zoom's E2EE protocol, and also lay foundation to the general problem of E2EE group video communication. We observe that the vast security literature analyzing asynchronous messaging does not translate well to synchronous video calls. Namely, while strong forms of forward secrecy and post compromise security are less important for (typically short-lived) video calls, various liveness properties become crucial. For example, mandating that participants quickly learn of updates to the meeting roster and key, media streams being displayed are recent, and banned participants promptly lose any access to the meeting. Our main results are as follows: 1. Propose a new notion of leader-based continuous group key agreement with liveness, which accurately captures the E2EE properties specific to the synchronous communication scenario. 2. Prove security of the core of Zoom's E2EE meetings protocol in the above well-defined model. 3. Propose ways to strengthen Zoom's liveness properties by simple modifications to the original protocol, which have since been deployed in production.
引用
收藏
页码:157 / 189
页数:33
相关论文
共 50 条
  • [1] Security Analysis of End-to-End Encryption for Zoom Meetings
    Isobe, Takanori
    Ito, Ryoma
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 234 - 253
  • [2] Security Analysis of End-to-End Encryption for Zoom Meetings
    Isobe, Takanori
    Ito, Ryoma
    [J]. IEEE ACCESS, 2021, 9 : 90677 - 90689
  • [3] End-to-end encrypted communication security technology for mobile terminals
    Zhang, Xiaozhi
    [J]. INTERNATIONAL JOURNAL OF AUTONOMOUS AND ADAPTIVE COMMUNICATIONS SYSTEMS, 2021, 14 (1-2) : 179 - 195
  • [4] End-to-End Differentiable Proving
    Rocktaschel, Tim
    Riedel, Sebastian
    [J]. ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 30 (NIPS 2017), 2017, 30
  • [5] Traceback for End-to-End Encrypted Messaging
    Tyagi, Nirvan
    Miers, Ian
    Ristenpart, Thomas
    [J]. PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 413 - 430
  • [6] End-to-End Encrypted Cloud Storage
    Backendal, Matilda
    Haller, Miro
    Paterson, Kenny
    [J]. IEEE SECURITY & PRIVACY, 2024, 22 (02) : 69 - 74
  • [7] The end of end-to-end security?
    Bradner, S
    [J]. IEEE SECURITY & PRIVACY, 2006, 4 (02) : 76 - 79
  • [8] End-to-End Encrypted Messaging Protocols: An Overview
    Ermoshina, Ksenia
    Musiani, Francesca
    Halpin, Harry
    [J]. INTERNET SCIENCE, (INSCI 2016), 2016, 9934 : 244 - 254
  • [9] End-to-end Learning for Encrypted Image Retrieval
    Feng, Qihua
    Li, Peiya
    Lu, ZhiXun
    Liu, Guan
    Huang, Feiran
    [J]. 2021 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2021, : 1839 - 1845
  • [10] End-to-end Flow Inference of Encrypted MANET
    Chang, Huijun
    Shan, Hong
    [J]. 2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY (ICIST), 2013, : 1104 - 1109