POSTER: End-to-End Secure Mobile Group Messaging with Conversation Integrity and Minimal Metadata Leakage

Mike Schliep, Nicholas Hopper

Research output: Contribution to journalConference articlepeer-review

Abstract

Existing End-to-End secure messaging applications trust a single service provider to deliver messages in a consistent order to a consistent group of conversation members. We propose a protocol that removes this single point of failure by using multiple service providers, enforcing conversation integrity as long as one service provider out of N behave honestly. However, this approach could potentially increase the number of entities that learn the metadata for a conversation. In this work we discuss the challenges and provide a protocol that limits the metadata leakage to that of existing messaging applications while still providing strong conversation integrity.

Original languageEnglish (US)
Pages (from-to)2282-2284
Number of pages3
JournalProceedings of the ACM Conference on Computer and Communications Security
Volume2018-January
DOIs
StatePublished - 2018
Event25th ACM Conference on Computer and Communications Security, CCS 2018 - Toronto, Canada
Duration: Oct 15 2018 → …

Bibliographical note

Publisher Copyright:
©2018 Copyright held by the owner/author(s).

Keywords

  • Cryptographic Protocol
  • End-to-End Encryption
  • Secure Messaging

Fingerprint

Dive into the research topics of 'POSTER: End-to-End Secure Mobile Group Messaging with Conversation Integrity and Minimal Metadata Leakage'. Together they form a unique fingerprint.

Cite this