End-to-End Post-Quantum Cryptography Encryption Protocol for Video Conferencing System Based on Government Public Key Infrastructure

被引:0
|
作者
Park, Yeongjae [1 ]
Yoo, Hyeondo [1 ]
Ryu, Jieun [1 ]
Choi, Young-Rak [1 ]
Kang, Ju-Sung [2 ]
Yeom, Yongjin [2 ]
机构
[1] Kookmin Univ, Dept Financial Informat Secur, Seoul 02727, South Korea
[2] Kookmin Univ, Dept Informat Secur Cryptol & Math, Seoul 02707, South Korea
关键词
end-to-end encryption (E2EE); video conferencing system; Zoom; Secure Frame (SFrame); messaging layer security (MLS); Government Public Key Infrastructure (GPKI); post-quantum cryptography (PQC); key encapsulation mechanism (KEM);
D O I
10.3390/asi6040066
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Owing to the expansion of non-face-to-face activities, security issues in video conferencing systems are becoming more critical. In this paper, we focus on the end-to-end encryption (E2EE) function among the security services of video conferencing systems. First, the E2EE-related protocols of Zoom and Secure Frame (SFrame), which are representative video conferencing systems, are thoroughly investigated, and the two systems are compared and analyzed from the overall viewpoint. Next, the E2EE protocol in a Government Public Key Infrastructure (GPKI)-based video conferencing system, in which the user authentication mechanism is fundamentally different from those used in commercial sector systems such as Zoom and SFrame, is considered. In particular, among E2EE-related protocols, we propose a detailed mechanism in which the post-quantum cryptography (PQC) key encapsulation mechanism (KEM) is applied to the user key exchange process. Since the session key is not disclosed to the central server, even in futuristic quantum computers, the proposed mechanism, which includes the PQC KEM, still satisfies the E2EE security requirements in the quantum environment. Moreover, our GPKI-based mechanism induces the effect of enhancing the security level of the next-generation video conferencing systems up to a quantum-safe level.
引用
收藏
页数:16
相关论文
共 50 条
  • [1] Homomorphic Encryption Based on Post-Quantum Cryptography
    Chen, Abel C. H.
    [J]. 2023 IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLIED NETWORK TECHNOLOGIES, ICMLANT, 2023, : 56 - 60
  • [2] An End-To-End Secure Mobile Payment System Using Public Key Infrastructure System
    Britto, S.
    Kumar, R.
    Rabara, S. Albert
    [J]. JOURNAL OF ALGORITHMS & COMPUTATIONAL TECHNOLOGY, 2012, 6 (03) : 395 - 409
  • [3] Post-Quantum Secure Inner Product Functional Encryption Using Multivariate Public Key Cryptography
    Debnath, Sumit Kumar
    Mesnager, Sihem
    Dey, Kunal
    Kundu, Nibedita
    [J]. MEDITERRANEAN JOURNAL OF MATHEMATICS, 2021, 18 (05)
  • [4] Post-Quantum Secure Inner Product Functional Encryption Using Multivariate Public Key Cryptography
    Sumit Kumar Debnath
    Sihem Mesnager
    Kunal Dey
    Nibedita Kundu
    [J]. Mediterranean Journal of Mathematics, 2021, 18
  • [5] Anonymous, Robust Post-quantum Public Key Encryption
    Grubbs, Paul
    Maram, Varun
    Paterson, Kenneth G.
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2022, 13277 LNCS : 402 - 432
  • [6] Revisiting Anonymity in Post-quantum Public Key Encryption
    Cheng, Yao
    Lu, Xianhui
    Li, Ziyi
    Li, Bao
    [J]. POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2024, PT II, 2024, 14772 : 336 - 370
  • [7] Anonymous, Robust Post-quantum Public Key Encryption
    Grubbs, Paul
    Maram, Varun
    Paterson, Kenneth G.
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT III, 2022, 13277 : 402 - 432
  • [8] A post-quantum end-to-end encryption over smart contract-based blockchain for defeating man-in-the-middle and interception attacks
    Karbasi, Amir Hassani
    Shahpasand, Siyamak
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (05) : 1423 - 1441
  • [9] A Video Steganography Scheme Based on Post-Quantum Cryptography
    Huang, Yiming
    Lei, Zhongkui
    Song, Zhufu
    Guo, Yueru
    Li, Yihang
    [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND SOFTWARE ENGINEERING (ICICSE 2021), 2021, : 83 - 87
  • [10] A post-quantum end-to-end encryption over smart contract-based blockchain for defeating man-in-the-middle and interception attacks
    Amir Hassani Karbasi
    Siyamak Shahpasand
    [J]. Peer-to-Peer Networking and Applications, 2020, 13 : 1423 - 1441