Towards Perfectly Secure and Deniable Communication Using an NFC-Based Key-Exchange Scheme
2015 (English)In: SECURE IT SYSTEMS, NORDSEC 2015, 2015, Vol. 9417, 72-87 p.Conference paper (Refereed)
In this paper we first analyse the possibility for deniability under a strong adversary, who has an Internet-wide transcript of the communication. Secondly, we present a scheme which provides the desirable properties of previous messaging schemes, but with stronger deniability under the new adversary model. Our scheme requires physical meetings for exchanges of large amounts of random key-material via near-field communication and later uses this random data to key a one-time pad for text-messaging. We prove the correctness of the protocol and, finally, we evaluate the practical feasibility of the suggested scheme.
Place, publisher, year, edition, pages
2015. Vol. 9417, 72-87 p.
Lecture Notes in Computer Science
Deniability; Deniable encryption; Authenticated encryption; Perfect secrecy; Off-the-record; Key-exchange; Near-field communication; Surveillance
IdentifiersURN: urn:nbn:se:miun:diva-29724DOI: 10.1007/978-3-319-26502-5\_6ISI: 000374098500006OAI: oai:DiVA.org:miun-29724DiVA: diva2:1058816
20th Nordic Conference on Secure IT Systems (NordSec), KTH Royal Inst Technol, Stockholm, SWEDEN, OCT 19-21, 2015