[go: up one dir, main page]

What a lovely hat

Is it made out of tin foil?

Paper 2018/920

A Message Franking Channel

Loïs Huguenin-Dumittan and Iraklis Leontiadis

Abstract

We pursue to formalize and instantiate a secure bidirectional channel with message franking properties. Under this model a sender may send an abusive message to the receiver and the latter wish to open it in a verifiable way to a third party. Potential malicious behavior of a sender requires message franking protocols resistant to sending messages that cannot be opened later by the receiver. An adversary impersonated by the receiver may also try to open messages that have not been sent by the sender. Wrapping a message franking protocol in a secure channel requires a more delicate treatment in order to avoid drops or replay of messages and out-of-order delivery. To the best of our knowledge we are the first to model the security of a message franking channel, which apart from integrity, confidentiality, resistance to drops, relays and out-of-order delivery is sender and receiver binding: a sender cannot send a message which cannot be opened in a verifiable way later by the receiver, and the receiver cannot claim a message that had not been truly sent by the receiver. Finally, we instantiate a bidirectional message franking channel from symmetric primitives and analyze its security.

Metadata
Available format(s)
PDF
Publication info
Preprint. MINOR revision.
Keywords
message franking channelsecure communicationchannel securityabusive verifiable reports
Contact author(s)
iraklis leontiadis @ epfl ch
History
2018-10-02: received
Short URL
https://ia.cr/2018/920
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2018/920,
      author = {Loïs Huguenin-Dumittan and Iraklis Leontiadis},
      title = {A Message Franking Channel},
      howpublished = {Cryptology {ePrint} Archive, Paper 2018/920},
      year = {2018},
      url = {https://eprint.iacr.org/2018/920}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.