Analysis and Improvements of the Sender Keys Protocol for Group Messaging

01/17/2023
by   David Balbás, et al.
0

Messaging between two parties and in the group setting has enjoyed widespread attention both in practice, and, more recently, from the cryptographic community. One of the main challenges in the area is constructing secure (end-to-end encrypted) and efficient messaging protocols for group conversations. The popular messaging applications WhatsApp and Signal utilise a protocol in which, instead of sharing a single group key, members have individual sender keys, which are shared with all other group members. The Sender Keys protocol is claimed to offer forward security guarantees. However, despite its broad adoption in practice, it has never been studied formally in the cryptographic literature. In this paper we present the first analysis of the Sender Keys protocol along with some prospective improvements. To this end, we introduce a new cryptographic primitive, develop a game-based security model, present a security analysis in the passive and active settings, and propose several improvements to the protocol.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/30/2019

Cryptographic key distribution over a public network via variance-based watermarking in compressive measurements

The optical communication has an increasing need for security in public ...
research
09/25/2019

Generation and Distribution of Quantum Oblivious Keys for Secure Multiparty Computation

The oblivious transfer primitive is sufficient to implement secure multi...
research
05/06/2021

Exploiting Partial Order of Keys to Verify Security of a Vehicular Group Protocol

Vehicular networks will enable a range of novel applications to enhance ...
research
11/14/2019

Enabling Efficient Privacy-Assured Outlier Detection over Encrypted Incremental Datasets

Outlier detection is widely used in practice to track the anomaly on inc...
research
07/20/2018

The Snowden Phone: A Comparative Survey of Secure Instant Messaging Mobile Applications (authors' version)

In recent years, it has come to attention that governments have been doi...
research
03/25/2021

The Cost of OSCORE and EDHOC for Constrained Devices

Many modern IoT applications rely on the Constrained Application Protoco...
research
04/12/2020

The Albakri-Harn key pre-distribution scheme is insecure

The Albakri-Harn group key pre-distribution protocol, which enables any ...

Please sign up or login with your details

Forgot password? Click here to reset