Determining the core primitive for optimally secure ratcheting

F Balli, P Rösler, S Vaudenay - … 2020: 26th International Conference on the …, 2020 - Springer
After ratcheting attracted attention mostly due to practical real-world protocols, recently a line
of work studied ratcheting as a primitive from a theoretic point of view. Literature in this line …

Clone detection in secure messaging: improving post-compromise security in practice

C Cremers, J Fairoze, B Kiesl, A Naska - Proceedings of the 2020 ACM …, 2020 - dl.acm.org
We investigate whether modern messaging apps achieve the strong post-compromise
security guarantees offered by their underlying protocols. In particular, we perform a black …

On secure ratcheting with immediate decryption

J Pijnenburg, B Poettering - International Conference on the Theory and …, 2022 - Springer
Ratcheting protocols let parties securely exchange messages in environments in which state
exposure attacks are anticipated. While, unavoidably, some promises on confidentiality and …

Symmetric asynchronous ratcheted communication with associated data

H Yan, S Vaudenay - Advances in Information and Computer Security …, 2020 - Springer
Following up mass surveillance and privacy issues, modern secure communication
protocols now seek strong security, such as forward secrecy and post-compromise security …

[PDF][PDF] Optimally secure instant messaging with immediate decryption and backup solutions

J Pijnenburg - 2023 - core.ac.uk
This thesis explores security goals in the instant messaging setting and backup solutions for
messages and media, both in the case where the device is still available (but has limited …

[PDF][PDF] Cryptographic foundations of modern stateful and continuous key exchange primitives

PC Rösler - 2021 - roeslpa.de
Protecting communication cryptographically is usually considered and realized modularly:
Protocols for protecting the actual payload utilize session keys that are exchanged by other …