Abstract
Existing End-to-End secure messaging applications trust a single service provider to deliver messages in a consistent order to a consistent group of conversation members. We propose a protocol that removes this single point of failure by using multiple service providers, enforcing conversation integrity as long as one service provider out of N behave honestly. However, this approach could potentially increase the number of entities that learn the metadata for a conversation. In this work we discuss the challenges and provide a protocol that limits the metadata leakage to that of existing messaging applications while still providing strong conversation integrity.
Original language | English (US) |
---|---|
Pages (from-to) | 2282-2284 |
Number of pages | 3 |
Journal | Proceedings of the ACM Conference on Computer and Communications Security |
Volume | 2018-January |
DOIs | |
State | Published - 2018 |
Event | 25th ACM Conference on Computer and Communications Security, CCS 2018 - Toronto, Canada Duration: Oct 15 2018 → … |
Bibliographical note
Funding Information:This work was sponsored by the National Science Foundation under grant 1814753.
Publisher Copyright:
©2018 Copyright held by the owner/author(s).
Keywords
- Cryptographic Protocol
- End-to-End Encryption
- Secure Messaging