Working paper icon

Working paper

Static Protocols and Deniability

Abstract:
When designing a security protocol, every choice can have far-reaching repercussions. It is therefore useful to know precisely which security goals may be achievable given the protocol structure, and which are proven impossible. In this work we present some preliminary results about static protocols, whose messages do not depend on the sender's secret key, and deniable protocols, whose transcripts do not comprise proof of communication. In particular, we sketch proofs that static protocols cannot achieve explicit authentication of their peer, that they achieve deniability "or free", and that deniable protocols with explicit authentication must use a challenge-response format.
Publication status:
Not published
Peer review status:
Not peer reviewed

Actions


Access Document


Files:

Authors


More by this author
Institution:
University of Oxford
Division:
Cross-academic groups
Department:
CDT in Cyber Security
Research group:
CDT in Cyber Security
Role:
Author


Edition:
Author's Original


Language:
English
Subjects:
UUID:
uuid:2af7467a-18a5-4cd7-8a83-b103fba78f70
Local pid:
ora:11252
Deposit date:
2015-04-29

Terms of use



Views and Downloads






If you are the owner of this record, you can report an update to it here: Report update to this record

TO TOP