Static Protocols and Deniability

When designing a security protocol, every choice can have far-reaching repercussions. It is therefore useful to know precisely which security goals may be achievable given the protocol structure, and which are proven impossible. In this work we present some preliminary results about static protocols...

Full description

Bibliographic Details
Main Author: Cohn-Gordon, K
Format: Working paper
Language:English
Published: 2015
Subjects:
_version_ 1797060058307100672
author Cohn-Gordon, K
author_facet Cohn-Gordon, K
author_sort Cohn-Gordon, K
collection OXFORD
description When designing a security protocol, every choice can have far-reaching repercussions. It is therefore useful to know precisely which security goals may be achievable given the protocol structure, and which are proven impossible. In this work we present some preliminary results about static protocols, whose messages do not depend on the sender's secret key, and deniable protocols, whose transcripts do not comprise proof of communication. In particular, we sketch proofs that static protocols cannot achieve explicit authentication of their peer, that they achieve deniability "or free", and that deniable protocols with explicit authentication must use a challenge-response format.
first_indexed 2024-03-06T20:12:16Z
format Working paper
id oxford-uuid:2af7467a-18a5-4cd7-8a83-b103fba78f70
institution University of Oxford
language English
last_indexed 2024-03-06T20:12:16Z
publishDate 2015
record_format dspace
spelling oxford-uuid:2af7467a-18a5-4cd7-8a83-b103fba78f702022-03-26T12:28:08ZStatic Protocols and DeniabilityWorking paperhttp://purl.org/coar/resource_type/c_8042uuid:2af7467a-18a5-4cd7-8a83-b103fba78f70Computer securityComputingCyber SecurityEnglishOxford University Research Archive - Valet2015Cohn-Gordon, KWhen designing a security protocol, every choice can have far-reaching repercussions. It is therefore useful to know precisely which security goals may be achievable given the protocol structure, and which are proven impossible. In this work we present some preliminary results about static protocols, whose messages do not depend on the sender's secret key, and deniable protocols, whose transcripts do not comprise proof of communication. In particular, we sketch proofs that static protocols cannot achieve explicit authentication of their peer, that they achieve deniability "or free", and that deniable protocols with explicit authentication must use a challenge-response format.
spellingShingle Computer security
Computing
Cyber Security
Cohn-Gordon, K
Static Protocols and Deniability
title Static Protocols and Deniability
title_full Static Protocols and Deniability
title_fullStr Static Protocols and Deniability
title_full_unstemmed Static Protocols and Deniability
title_short Static Protocols and Deniability
title_sort static protocols and deniability
topic Computer security
Computing
Cyber Security
work_keys_str_mv AT cohngordonk staticprotocolsanddeniability