YoVDO

Out of Band Authentication in Group Messaging - Computational, Statistical, Optimal

Offered By: TheIACR via YouTube

Tags

Conference Talks Courses Cryptography Courses Network Security Courses Statistical Analysis Courses End-to-End Encryption Courses Man in The Middle Attacks Courses Protocol Design Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a presentation from Crypto 2018 on out-of-band authentication in group messaging, focusing on computational, statistical, and optimal aspects. Delve into the paper by Lior Rotem and Gil Segev, which addresses end-to-end encrypted messaging, man-in-the-middle attacks, and user-to-user settings. Examine the group setting, correctness and security measures, and the proposed computationally-secure protocol. Investigate concurrent non-malleable commitments, statistical lower bounds, and protocol structures. Gain insights into the challenges and solutions for secure group messaging authentication.

Syllabus

Intro
Major Effort: E2E-Encrypted Messaging
Man-in-the-Middle Attacks
The User-to-User Setting
User-to-User Bounds
This Talk: The Group Setting
Our Contributions
Correctness & Security
The Naïve Protocol
Our Computationally-Secure Protocol
Example: One Possible Attack
Concurrent Non-Malleable Commitments
Our Statistical Lower Bound
Protocol Structure
Understanding H(E)


Taught by

TheIACR

Related Courses

Networking with Python: Socket Programming for Communication
Raspberry Pi Foundation via FutureLearn
How to Do Fiat-Shamir in the Standard Model
Simons Institute via YouTube
Partially Specified Channels- The TLS 1.3 Record Layer Without Elision
Association for Computing Machinery (ACM) via YouTube
Asiacrypt 2022 Real World Protocols
TheIACR via YouTube
Blazing Fast OT for Three-Round UC OT Extension
TheIACR via YouTube