2019
DOI: 10.1007/978-3-030-26834-3_20
|View full text |Cite
|
Sign up to set email alerts
|

Bidirectional Asynchronous Ratcheted Key Agreement with Linear Complexity

Abstract: Following up mass surveillance and privacy issues, modern secure communication protocols now seek more security such as forward secrecy and post-compromise security. They cannot rely on an assumption such as synchronization, predictable sender/receiver roles, or online availability. Ratcheting was introduced to address forward secrecy and postcompromise security in real-world messaging protocols. At CSF 2016 and CRYPTO 2017, ratcheting was studied either without zero round-trip time (0-RTT) or without bidirect… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
6

Relationship

3
3

Authors

Journals

citations
Cited by 25 publications
(26 citation statements)
references
References 15 publications
0
26
0
Order By: Relevance
“…Subsequent to these strongly secure ratcheting notions, multiple weaker formal definitions for ratcheting were proposed that consider special properties such as strong explicit authentication [8], out of order receipt of ciphertexts [1], or primarily target on allowing efficient instantiations [12,4]. Table 1: Differences in security notions of ratcheting regarding (a) uni-(→), sesqui-( →), and bidirectional (↔) interaction between A and B, (b) when the adversary is allowed to expose A's and B's state (or when this is unnecessarily restricted), (c) the adversary's ability to reveal or manipulate algorithm invocations' random coins, and (d) how soon and how complete recovery from these two attacks into a secure state is required of secure constructions (or if unnecessary delays or exceptions for recovery are permitted).…”
Section: Relaxed Security Notionsmentioning
confidence: 99%
See 4 more Smart Citations
“…Subsequent to these strongly secure ratcheting notions, multiple weaker formal definitions for ratcheting were proposed that consider special properties such as strong explicit authentication [8], out of order receipt of ciphertexts [1], or primarily target on allowing efficient instantiations [12,4]. Table 1: Differences in security notions of ratcheting regarding (a) uni-(→), sesqui-( →), and bidirectional (↔) interaction between A and B, (b) when the adversary is allowed to expose A's and B's state (or when this is unnecessarily restricted), (c) the adversary's ability to reveal or manipulate algorithm invocations' random coins, and (d) how soon and how complete recovery from these two attacks into a secure state is required of secure constructions (or if unnecessary delays or exceptions for recovery are permitted).…”
Section: Relaxed Security Notionsmentioning
confidence: 99%
“…While these works are syntactically similar, we shortly sketch their different relaxations regarding security -making their security notions sub-optimal. Durak and Vaudenay [8] and Caforio et al [4] forbid the adversary to perform impersonation attacks against the communication between A and B during the establishment of a secure key. Thus, they do not require recovery from state exposures -which are a part of impersonation attacks -in all possible cases, which we denote as "partial recovery" (see Table 1).…”
Section: Relaxed Security Notionsmentioning
confidence: 99%
See 3 more Smart Citations