Title | ||
---|---|---|
Towards Perfectly Secure and Deniable Communication Using an NFC-Based Key-Exchange Scheme. |
Abstract | ||
---|---|---|
In this paper we first analyse the possibility for deniability under a strong adversary, who has an Internet-wide transcript of the communication. Secondly, we present a scheme which provides the desirable properties of previous messaging schemes, but with stronger deniability under the new adversary model. Our scheme requires physical meetings for exchanges of large amounts of random key-material via near-field communication and later uses this random data to key a one-time pad for text-messaging. We prove the correctness of the protocol and, finally, we evaluate the practical feasibility of the suggested scheme. |
Year | DOI | Venue |
---|---|---|
2015 | 10.1007/978-3-319-26502-5_6 | Lecture Notes in Computer Science |
Keywords | Field | DocType |
Deniability,Deniable encryption,Authenticated encryption,Perfect secrecy,Off-the-record,Key-exchange,Near-field communication,Surveillance | Deniable encryption,Key exchange,Adversary model,Computer science,Computer security,Correctness,Information-theoretic security,Adversary,Authenticated encryption | Conference |
Volume | ISSN | Citations |
9417 | 0302-9743 | 0 |
PageRank | References | Authors |
0.34 | 3 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Daniel Bosk | 1 | 0 | 0.68 |
Martin Kjellqvist | 2 | 0 | 0.68 |
Sonja Buchegger | 3 | 1292 | 85.73 |