OpenPGP Email Forwarding Via Diverted Elliptic Curve Diffie-Hellman Key Exchanges

11/13/2022
by   Francisco Vial-Prado, et al.
0

An offline OpenPGP user might want to forward part or all of their email messages to third parties. Given that messages are encrypted, this requires transforming them into ciphertexts decryptable by the intended forwarded parties, while maintaining confidentiality and authentication. It is shown in recent lines of work that this can be achieved by means of proxy-re-encryption schemes, however, while encrypted email forwarding is the most mentioned application of proxy-re-encryption, it has not been implemented in the OpenPGP context, to the best of our knowledge. In this paper, we adapt the seminal technique introduced by Blaze, Bleumer and Strauss in EUROCRYPT'98, allowing a Mail Transfer Agent to transform and forward OpenPGP messages without access to decryption keys or plaintexts. We also provide implementation details and a security analysis.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/07/2023

Exploring Encrypted Keyboards to Defeat Client-Side Scanning in End-to-End Encryption Systems

End-to-End Encryption (E2EE) aims to make all messages impossible to rea...
research
07/17/2020

Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: An Extended Survey

New cryptographic techniques such as homomorphic encryption (HE) allow c...
research
10/13/2022

Multi-recipient and threshold encryption based on hidden multipliers

In this paper, a scheme is proposed that allow the dealer to encrypt mes...
research
01/23/2018

qrypt0 - encrypted short messages exchanged between offline computers

A system is described for exchanging encrypted short messages between co...
research
05/14/2020

Lattice-based Unidirectional IBPRE Secure in Standard Model

Proxy re-encryption (PRE) securely enables the re-encryption of cipherte...
research
06/25/2019

Proxy Certificates: The Missing Link in the Web's Chain of Trust

The ability to quickly revoke a compromised key is critical to the secur...
research
11/16/2020

Collusion-Resistant Identity-based Proxy Re-Encryption: Lattice-based Constructions in Standard Model

The concept of proxy re-encryption (PRE) dates back to the work of Blaze...

Please sign up or login with your details

Forgot password? Click here to reset