YoVDO

Out of Band Authentication in Group Messaging - Computational, Statistical, Optimal

Offered By: TheIACR via YouTube

Tags

Conference Talks Courses Cryptography Courses Network Security Courses Statistical Analysis Courses End-to-End Encryption Courses Man in The Middle Attacks Courses Protocol Design Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a presentation from Crypto 2018 on out-of-band authentication in group messaging, focusing on computational, statistical, and optimal aspects. Delve into the paper by Lior Rotem and Gil Segev, which addresses end-to-end encrypted messaging, man-in-the-middle attacks, and user-to-user settings. Examine the group setting, correctness and security measures, and the proposed computationally-secure protocol. Investigate concurrent non-malleable commitments, statistical lower bounds, and protocol structures. Gain insights into the challenges and solutions for secure group messaging authentication.

Syllabus

Intro
Major Effort: E2E-Encrypted Messaging
Man-in-the-Middle Attacks
The User-to-User Setting
User-to-User Bounds
This Talk: The Group Setting
Our Contributions
Correctness & Security
The Naïve Protocol
Our Computationally-Secure Protocol
Example: One Possible Attack
Concurrent Non-Malleable Commitments
Our Statistical Lower Bound
Protocol Structure
Understanding H(E)


Taught by

TheIACR

Related Courses

Introduction to Operations Management
Wharton School of the University of Pennsylvania via Coursera
Computational Molecular Evolution
Technical University of Denmark (DTU) via Coursera
Structural Equation Model and its Applications | 结构方程模型及其应用 (普通话)
The Chinese University of Hong Kong via Coursera
Fundamentals of Clinical Trials
Harvard University via edX
Curso Práctico de Bioestadística con R
Universidad San Pablo CEU via Miríadax