Universally Composable End-to-End Secure Messaging

被引:4
|
作者
Canetti, Ran [1 ]
Jain, Palak [1 ]
Swanberg, Marika [1 ]
Varia, Mayank [1 ]
机构
[1] Boston Univ, Boston, MA 02215 USA
来源
基金
美国国家科学基金会;
关键词
KEY-EXCHANGE;
D O I
10.1007/978-3-031-15979-4_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We model and analyze the Signal end-to-end messaging protocol within the UC framework. In particular: - We formulate an ideal functionality that captures end-to-end secure messaging, in a setting with PKI and an untrusted server, against an adversary that has full control over the network and can adaptively and momentarily compromise parties at any time and obtain their entire internal states. In particular our analysis captures the forward secrecy and recovery-of-security properties of Signal and the conditions under which they break. - We model the main components of the Signal architecture (PKI and long-term keys, the backbone continuous-key-exchange or "asymmetric ratchet," epoch-level symmetric ratchets, authenticated encryption) as individual ideal functionalities that are realized and analyzed separately and then composed using the UC and Global-State UC theorems. - We show how the ideal functionalities representing these components can be realized using standard cryptographic primitives under minimal hardness assumptions. Our modeling introduces additional innovations that enable arguing about the security of Signal irrespective of the underlying communication medium, as well as secure composition of dynamically generated modules that share state. These features, together with the basic modularity of the UC framework, will hopefully facilitate the use of both Signal-as-a-whole and its individual components within cryptographic applications. Two other features of our modeling are the treatment of fully adaptive corruptions, and making minimal use of random oracle abstractions. In particular, we show how to realize continuous key exchange in the plain model, while preserving security against adaptive corruptions.
引用
收藏
页码:3 / 33
页数:31
相关论文
共 50 条
  • [1] End-to-End Secure Messaging with Traceability Only for Illegal Content
    Bartusek, James
    Garg, Sanjam
    Jain, Abhishek
    Policharla, Guru-Vamsi
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2023, PT V, 2023, 14008 : 35 - 66
  • [2] SEEMless: Secure End-to-End Encrypted Messaging with less Trust
    Chase, Melissa
    Deshpande, Apoorvaa
    Ghosh, Esha
    Malvai, Harjasleen
    [J]. PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 1639 - 1656
  • [3] Quantum-resistant End-to-End Secure Messaging and Email Communication
    Doeberl, Christoph
    Eibner, Wolfgang
    Gaertner, Simon
    Kos, Manuela
    Kutschera, Florian
    Ramacher, Sebastian
    [J]. 18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
  • [4] SoK: An Analysis of End-to-End Encryption and Authentication Ceremonies in Secure Messaging Systems
    Alatawi, Mashari
    Saxena, Nitesh
    [J]. PROCEEDINGS OF THE 16TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS, WISEC 2023, 2023, : 187 - 201
  • [5] Traceback for End-to-End Encrypted Messaging
    Tyagi, Nirvan
    Miers, Ian
    Ristenpart, Thomas
    [J]. PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 413 - 430
  • [6] End-to-End Secure Mobile Group Messaging with Conversation Integrity and Minimal Metadata Leakage
    Schliep, Mike
    Hopper, Nicholas
    [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2282 - 2284
  • [7] End-to-End Encrypted Messaging Protocols: An Overview
    Ermoshina, Ksenia
    Musiani, Francesca
    Halpin, Harry
    [J]. INTERNET SCIENCE, (INSCI 2016), 2016, 9934 : 244 - 254
  • [8] Secure Provisioning for Achieving End-to-End Secure Communications
    Sousa, Patricia R.
    Resende, Joao S.
    Martins, Rolando
    Antunes, Luis
    [J]. AD-HOC, MOBILE, AND WIRELESS NETWORKS (ADHOC-NOW 2019), 2019, 11803 : 498 - 507
  • [9] End-to-end Secure Insurance Telematics
    Salant, Eliot
    Gershinsky, Gidon
    [J]. SYSTOR '19: PROCEEDINGS OF THE 12TH ACM INTERNATIONAL SYSTEMS AND STORAGE CONFERENCE, 2019, : 182 - 182
  • [10] A secure end-to-end IoT solution
    Mathur, Avijit
    Newe, Thomas
    Elgenaidi, Walid
    Rao, Muzaffar
    Dooly, Gerard
    Toal, Daniel
    [J]. SENSORS AND ACTUATORS A-PHYSICAL, 2017, 263 : 291 - 299