ログイン 新規登録
言語:

WEKO3

  • トップ
  • ランキング
To
lat lon distance
To

Field does not validate



インデックスリンク

インデックスツリー

メールアドレスを入力してください。

WEKO

One fine body…

WEKO

One fine body…

アイテム

  1. シンポジウム
  2. シンポジウムシリーズ
  3. コンピュータセキュリティシンポジウム
  4. 2022

The Blind-X3DH Authenticated Key Exchange

https://ipsj.ixsq.nii.ac.jp/records/223136
https://ipsj.ixsq.nii.ac.jp/records/223136
a388942b-ee99-405b-821d-cc271bd986ec
名前 / ファイル ライセンス アクション
IPSJ-CSS2022081.pdf IPSJ-CSS2022081.pdf (348.3 kB)
Copyright (c) 2022 by the Information Processing Society of Japan
オープンアクセス
Item type Symposium(1)
公開日 2022-10-17
タイトル
タイトル The Blind-X3DH Authenticated Key Exchange
タイトル
言語 en
タイトル The Blind-X3DH Authenticated Key Exchange
言語
言語 eng
資源タイプ
資源タイプ識別子 http://purl.org/coar/resource_type/c_5794
資源タイプ conference paper
著者所属
Graduate School of Engineering, Osaka University
著者所属
Graduate School of Engineering, Osaka University/JAIST
著者所属(英)
en
Graduate School of Engineering, Osaka University
著者所属(英)
en
Graduate School of Engineering, Osaka University / JAIST
著者名 Kaiming, Chen

× Kaiming, Chen

Kaiming, Chen

Search repository
Atsuko, Miyaji

× Atsuko, Miyaji

Atsuko, Miyaji

Search repository
著者名(英) Kaiming, Chen

× Kaiming, Chen

en Kaiming, Chen

Search repository
Atsuko, Miyaji

× Atsuko, Miyaji

en Atsuko, Miyaji

Search repository
論文抄録
内容記述タイプ Other
内容記述 The core of Signal, X3DH and Double Ratchet, is secure based on end-to-end encryption and applied to several applications. However, its quantization just regards the user's public key as his identity directly. The authentication of this identity needs to be carried out by a trusted third party, which will affect some security features such as deniability. We introduce a certificate system newly which can verify identities, and ensure the protocol's anonymity and deniability. We also give a new protocol Blind-X3DH based on RLWE and our new certificate system.
論文抄録(英)
内容記述タイプ Other
内容記述 The core of Signal, X3DH and Double Ratchet, is secure based on end-to-end encryption and applied to several applications. However, its quantization just regards the user's public key as his identity directly. The authentication of this identity needs to be carried out by a trusted third party, which will affect some security features such as deniability. We introduce a certificate system newly which can verify identities, and ensure the protocol's anonymity and deniability. We also give a new protocol Blind-X3DH based on RLWE and our new certificate system.
書誌情報 コンピュータセキュリティシンポジウム2022論文集

p. 591-597, 発行日 2022-10-17
出版者
言語 ja
出版者 情報処理学会
戻る
0
views
See details
Views

Versions

Ver.1 2025-01-19 13:30:08.873735
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Cite as

エクスポート

OAI-PMH
  • OAI-PMH JPCOAR
  • OAI-PMH DublinCore
  • OAI-PMH DDI
Other Formats
  • JSON
  • BIBTEX

Confirm


Powered by WEKO3


Powered by WEKO3