Deniable protocols allow their participants to plausibly deny their participation or what was being said. A variety of Internet and messaging protocols are designed with the goal of providing deniability as a means of enhancing privacy. At the same time, commodity hardware often has the ability to provide Trusted Execution Environments (TEEs) with remote attestation capabilities, which can provide credible proof to an external verifier of some state or property existing or having existed on a device. We show that the potential availability of remote attestation implies that unconditionally deniable protocols are impossible if they also provide message authentication. We then present an practical attack that can be used to compromise deniabi...
A deniable authenticated key exchange (DAKE) protocol establishes a secure channel without producing...
In today’s society, especially after everything that was reported by Edward Snowden when he, during ...
Tamper-proof devices are pretty powerful. They typically make security applications simpler (provide...
Deniable messaging protocols allow two parties to have ‘off-the-record’ conversations without leavin...
In today’s society, people are more aware of the need for encryption to keep their private informati...
Deniable message authentication has drawn significant attention since it was first formalized by Dwo...
Offline deniability is the ability to a-posteriori deny having participated in a particular communic...
Formal analysis of security protocols is becoming increasingly relevant. In formal analysis, a model...
Most commodity processors available today provide hardware-supported security extensions. Remote att...
Detta arbete behandlar en specifik typ av överbelastningsattack som blir allt mer populär. Dessa att...
Abstract. Deniable authentication is a technique that allows one party to send messages to another w...
Deniable Authentication protocols allow a Sender to authenticate a message for a Receiver, in a way ...
Modern secure messaging protocols typically aim to provide deniability. Achieving this requires that...
Under de senaste åren har antalet DDoS-attacker i Internets applikationsskikt ökat. Detta problem be...
Post-Compromise Security (PCS) is a property of secure-channelestablishment schemes which limits the...
A deniable authenticated key exchange (DAKE) protocol establishes a secure channel without producing...
In today’s society, especially after everything that was reported by Edward Snowden when he, during ...
Tamper-proof devices are pretty powerful. They typically make security applications simpler (provide...
Deniable messaging protocols allow two parties to have ‘off-the-record’ conversations without leavin...
In today’s society, people are more aware of the need for encryption to keep their private informati...
Deniable message authentication has drawn significant attention since it was first formalized by Dwo...
Offline deniability is the ability to a-posteriori deny having participated in a particular communic...
Formal analysis of security protocols is becoming increasingly relevant. In formal analysis, a model...
Most commodity processors available today provide hardware-supported security extensions. Remote att...
Detta arbete behandlar en specifik typ av överbelastningsattack som blir allt mer populär. Dessa att...
Abstract. Deniable authentication is a technique that allows one party to send messages to another w...
Deniable Authentication protocols allow a Sender to authenticate a message for a Receiver, in a way ...
Modern secure messaging protocols typically aim to provide deniability. Achieving this requires that...
Under de senaste åren har antalet DDoS-attacker i Internets applikationsskikt ökat. Detta problem be...
Post-Compromise Security (PCS) is a property of secure-channelestablishment schemes which limits the...
A deniable authenticated key exchange (DAKE) protocol establishes a secure channel without producing...
In today’s society, especially after everything that was reported by Edward Snowden when he, during ...
Tamper-proof devices are pretty powerful. They typically make security applications simpler (provide...