Towards Perfectly Secure and Deniable Communication Using an NFC-Based Key-Exchange Scheme
2015 (English)In: Secure IT Systems: 20th Nordic Conference NordSec 2015 / [ed] Sonja Buchegger; Mads Dam, Springer, 2015, Vol. 9417, 72-87 p.Conference paper (Refereed)Text
In this paper we first analyse the possibility for deniability under a strong adversary, who has an Internet-wide transcript of the communication. Secondly, we present a scheme which provides the desirable properties of previous messaging schemes, but with stronger deniability under the new adversary model. Our scheme requires physical meetings for exchanges of large amounts of random key-material via near-field communication and later uses this random data to key a one-time pad for text-messaging. We prove the correctness of the protocol and, finally, we evaluate the practical feasibility of the suggested scheme.
Place, publisher, year, edition, pages
Springer, 2015. Vol. 9417, 72-87 p.
, Lecture Notes in Computer Science
Deniability, Deniable encryption, Authenticated encryption, Perfect secrecy, Off-the-record, Key-exchange, Nearfield communication, Surveillance
Research subject Computer Science
IdentifiersURN: urn:nbn:se:kth:diva-178981DOI: 10.1007/978-3-319-26502-5_6ScopusID: 2-s2.0-84951873415OAI: oai:DiVA.org:kth-178981DiVA: diva2:892891
20th Nordic Conference NordSec 2015
FunderSwedish Foundation for Strategic Research , FFL09-0086Swedish Research Council, 2009-3793
QC 201602082016-01-112015-12-092016-05-27Bibliographically approved