End-to-End Encrypted Zoom Meetings: Proving Security and Strengthening Liveness

被引:1
|
作者
Dodis, Yevgeniy [1 ]
Jost, Daniel [1 ]
Kesavan, Balachandar [2 ]
Marcedone, Antonio [2 ]
机构
[1] NYU, New York, NY USA
[2] Zoom Video Commun, San Jose, CA 95113 USA
关键词
KEY-ENCAPSULATION; EFFICIENT; STANDARD;
D O I
10.1007/978-3-031-30589-4_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In May 2020, Zoom Video Communications, Inc. (Zoom) announced a multi-step plan to comprehensively support end-to-end encrypted (E2EE) group video calls and subsequently rolled out basic E2EE support to customers in October 2020. In this work we provide the first formal security analysis of Zoom's E2EE protocol, and also lay foundation to the general problem of E2EE group video communication. We observe that the vast security literature analyzing asynchronous messaging does not translate well to synchronous video calls. Namely, while strong forms of forward secrecy and post compromise security are less important for (typically short-lived) video calls, various liveness properties become crucial. For example, mandating that participants quickly learn of updates to the meeting roster and key, media streams being displayed are recent, and banned participants promptly lose any access to the meeting. Our main results are as follows: 1. Propose a new notion of leader-based continuous group key agreement with liveness, which accurately captures the E2EE properties specific to the synchronous communication scenario. 2. Prove security of the core of Zoom's E2EE meetings protocol in the above well-defined model. 3. Propose ways to strengthen Zoom's liveness properties by simple modifications to the original protocol, which have since been deployed in production.
引用
收藏
页码:157 / 189
页数:33
相关论文
共 50 条
  • [41] AN END-TO-END MODEL FROM SPEECH TO CLEAN TRANSCRIPT FOR PARLIAMENTARY MEETINGS
    Mimura, Masato
    Sakai, Shinsuke
    Kawahara, Tatsuya
    [J]. 2021 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2021, : 465 - 470
  • [42] Benefits of end-to-end IP for cyber and physical security
    Seewald, M. G.
    [J]. 2012 IEEE PES TRANSMISSION AND DISTRIBUTION CONFERENCE AND EXPOSITION (T&D), 2012,
  • [43] End-to-End Security for At-Home Medical Monitoring
    Subramanian, Mohanavalli Seetha
    Anand, Sheila
    [J]. ADVANCES IN NETWORK SECURITY AND APPLICATIONS, 2011, 196 : 483 - +
  • [44] IoTSM: An End-to-end Security Model for IoT Ecosystems
    Bugeja, Joseph
    Vogel, Bahtijar
    Jacobsson, Andreas
    Varshney, Rimpu
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS), 2019, : 267 - 272
  • [45] End-to-end security in telemedical networks - A practical guideline
    Wozak, Florian
    Schabetsberger, Thomas
    Ammmenwerth, Elske
    [J]. INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS, 2007, 76 (5-6) : 484 - 490
  • [46] Enhancement of end-to-end security in advanced metering infrastructure
    Kalidass, J.
    Purusothaman, T.
    Suresh, P.
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021,
  • [47] An End-to-End Security Approach for Digital Document Management
    Diego Munoz-Hernandez, Mario
    Morales-Sandoval, Miguel
    Juan Garcia-Hernandez, Jose
    [J]. COMPUTER JOURNAL, 2016, 59 (07): : 1076 - 1090
  • [48] End-to-end security assessment framework for connected vehicles
    Evans, David
    Calvo, Daniel
    Arroyo, Adrian
    Manilla, Alejandro
    Gomez, David
    [J]. 2019 22ND INTERNATIONAL SYMPOSIUM ON WIRELESS PERSONAL MULTIMEDIA COMMUNICATIONS (WPMC), 2019,
  • [49] Scalable end-to-end security for advanced metering infrastructures
    Nabeel, Mohamed
    Ding, Xiaoyu
    Seo, Seung-Hyun
    Bertino, Elisa
    [J]. INFORMATION SYSTEMS, 2015, 53 : 213 - 223
  • [50] Methodology and Tools for End-to-End SOA Security Configurations
    Satoh, Fumiko
    Tatsubori, Michiaki
    Nakamura, Yuichi
    Mukhi, Nirmal K.
    Ono, Kouichi
    [J]. IEEE CONGRESS ON SERVICES 2008, PT I, PROCEEDINGS, 2008, : 307 - +