Out of Band Authentication in Group Messaging - Computational, Statistical, Optimal
Offered By: TheIACR via YouTube
Course Description
Overview
Explore a presentation from Crypto 2018 on out-of-band authentication in group messaging, focusing on computational, statistical, and optimal aspects. Delve into the paper by Lior Rotem and Gil Segev, which addresses end-to-end encrypted messaging, man-in-the-middle attacks, and user-to-user settings. Examine the group setting, correctness and security measures, and the proposed computationally-secure protocol. Investigate concurrent non-malleable commitments, statistical lower bounds, and protocol structures. Gain insights into the challenges and solutions for secure group messaging authentication.
Syllabus
Intro
Major Effort: E2E-Encrypted Messaging
Man-in-the-Middle Attacks
The User-to-User Setting
User-to-User Bounds
This Talk: The Group Setting
Our Contributions
Correctness & Security
The Naïve Protocol
Our Computationally-Secure Protocol
Example: One Possible Attack
Concurrent Non-Malleable Commitments
Our Statistical Lower Bound
Protocol Structure
Understanding H(E)
Taught by
TheIACR
Related Courses
Introduction to Operations ManagementWharton School of the University of Pennsylvania via Coursera Computational Molecular Evolution
Technical University of Denmark (DTU) via Coursera Structural Equation Model and its Applications | 结构方程模型及其应用 (普通话)
The Chinese University of Hong Kong via Coursera Fundamentals of Clinical Trials
Harvard University via edX Curso Práctico de Bioestadística con R
Universidad San Pablo CEU via Miríadax