Deniable Authentication on the Internet

Subscribers:
351,000
Published on ● Video Link: https://www.youtube.com/watch?v=ftIRNqz6KKY



Duration: 1:17:56
308 views
2


We revisit the question of deniable cryptographic primitives, where, intuitively, a malicious party observing the interaction, cannot later prove to a third party that the interaction took place. Example include deniable message authentication, key exchange and identification. While these question was heavily studied in the literature, we argue that none of the existing definitions (and solutions) to this question is satisfactory. We propose the strongest and, arguably, the most natural and intuitive definition of deniability for these tasks: the proposed protocol should be secure in the recently proposed Generalized Universal Composability (GUC) Framework of Canetti, Dodis, Pass and Walfish. Among other things, our definition guarantees on-line deniability and concurrent composition. Quite remarkably, our main result shows that none of the above mentioned tasks (identification, key exchange, authentication) is realizable against adaptive attackers, even in the REGISTERED PUBLIC KEY MODEL (registered PKI), and even if data erasures are allowed. Registered PKI is the strongest setup assumption which is assumed to be reasonable. Thus, our result explains why all the previous attempts to solve deniability felt short of achieving the strongest form of deniability. We also show that various slight relaxation of our notion ARE achievable, and discuss implications of our results to the general task of designing deniable protocols.




Other Videos By Microsoft Research


2016-09-06Animating the Dead: Computational Necromancy with Reinforcement Learning [1/31]
2016-09-06Proxy-Based Peer-to-Peer Network: Analysis, Optimization and Algorithms
2016-09-06iBrain: Surviving the Technological Alteration of the Modern Mind
2016-09-06Child Sexual Abuse: Facts & Myths - What You Need To Know To Keep All Children Safe
2016-09-06Conversational Turn-Taking as a Dynamic Decision Process [1/15]
2016-09-06Directing the Datacenter with Machine Learning
2016-09-06The Unfinished Game: Pascal, Fermat & the 17th Century Letter that Made the World Modern
2016-09-06Cryptography: From Theory to Practice
2016-09-06A Cryptographic Compiler for Information-Flow Security
2016-09-06STAIR: The STanford Artificial Intelligence Robot project
2016-09-06Deniable Authentication on the Internet
2016-09-06Scalable Virtual Machine Multiplexing
2016-09-06Graph approximation and local clustering
2016-09-06The Subprime Solution: How Today's Global Financial Crisis Happened, and What to do about It
2016-09-06Real-Time Visual Localisation and Mapping with a Single Camera
2016-09-06Keeping Fit with the Jetsons
2016-09-06Linguistic Visualization for Fun and Profit
2016-09-06Rapid Language Portability for Speech Processing Systems
2016-09-06Context-Aware Scheduler: Avoiding Unfavorable Scheduling to Improve Virtual Machine Performance
2016-09-06The Bulk Multicore Architecture for Programmability
2016-09-06Part I: Improved mixing time bounds for the Thorp shuffle and L-reversal chain



Tags:
microsoft research