On the cryptographic deniability of the Signal protocol
From MaRDI portal
Recommendations
- On Subliminal Channels in Deterministic Signature Schemes
- The double ratchet: security notions, proofs, and modularization for the signal protocol
- Provably secure (broadcast) homomorphic signcryption
- Signatures on randomizable ciphertexts
- Deniable version of SIGMA key exchange protocol resilient to ephemeral key leakage
- On the security of the Courtois-Finiasz-Sendrier signature
- Confidential Signatures and Deterministic Signcryption
- Provably sender-deniable encryption scheme
- scientific article; zbMATH DE number 6536413
- On security of a certificateless signcryption scheme
Cited in
(9)- Post-quantum asynchronous deniable key exchange and the signal handshake
- Post-quantum signal key agreement from SIDH
- An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable
- On Subliminal Channels in Deterministic Signature Schemes
- Explainable arguments
- Security analysis of the WhatsApp end-to-end encrypted backup protocol
- An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable
- A more complete analysis of the signal double ratchet algorithm
- Continuous authentication in secure messaging
This page was built for publication: On the cryptographic deniability of the Signal protocol
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2229399)