Publication:
Post-quantum security of messengers: secure group chats and continuous key distribution protocols

dc.contributor.authorBobrysheva, J.
dc.contributor.authorZapechnikov, S.
dc.contributor.authorЗапечников, Сергей Владимирович
dc.date.accessioned2024-12-28T07:55:23Z
dc.date.available2024-12-28T07:55:23Z
dc.date.issued2023
dc.description.abstractSecure group chats in messengers are usually created in two ways: using pairwise channels with continuous key agreement according to the Double Ratchet scheme or using special cryptographic protocols, for example, based on a tree-like scheme for group keys generating. In the first case, each pair of users generates a common key, and the group is formed by the system tools. In the second case, all users of the group collectively generate an iteratively updated shared secret. Both methods have their advantages and disadvantages. If the first method is characterized by high overhead costs for storing and transferring key information, then in the second case, it is not possible to achieve such important security properties for instant messengers as post-compromise security and forward secrecy. However, the post-quantum resistance of these protocols remains unexplored. The article analyzes the existing group chat protocols for classical and post-quantum security. This work identifies the cryptographic primitives and protocol organization methods leading to decreasing cryptographic resistance to attacks using a quantum computer. The article proposes protocols resistant to adversary attacks with a quantum computer and discusses the possibilities of their application. The adversary model and the attack model are expanded and formally described considering attacks using a quantum computer. The main results of the work are secure group messaging protocols secure against attacks using a quantum computer, based on modifications of the tree-like schemes of continuous key agreement. The paper provides the specifications of the developed protocols. Possible technical difficulties in the implementation of post-quantum-resistant group messengers are identified, and directions for further research are outlined. © 2022, The Author(s), under exclusive licence to Springer-Verlag France SAS, part of Springer Nature.
dc.identifier.citationBobrysheva, J. Post-quantum security of messengers: secure group chats and continuous key distribution protocols / Bobrysheva, J., Zapechnikov, S. // Journal of Computer Virology and Hacking Techniques. - 2023. - 10.1007/s11416-022-00446-x
dc.identifier.doi10.1007/s11416-022-00446-x
dc.identifier.urihttps://www.doi.org/10.1007/s11416-022-00446-x
dc.identifier.urihttps://www.scopus.com/record/display.uri?eid=2-s2.0-85137047693&origin=resultslist
dc.identifier.urihttp://gateway.webofknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcAuth=Alerting&SrcApp=Alerting&DestApp=WOS_CPL&DestLinkType=FullRecord&UT=WOS:000844475600003
dc.identifier.urihttps://openrepository.mephi.ru/handle/123456789/29847
dc.relation.ispartofJournal of Computer Virology and Hacking Techniques
dc.titlePost-quantum security of messengers: secure group chats and continuous key distribution protocols
dc.typeArticle
dspace.entity.typePublication
relation.isAuthorOfPublicationa5cd9b64-c141-4a13-94a9-c9390fa862ea
relation.isAuthorOfPublication.latestForDiscoverya5cd9b64-c141-4a13-94a9-c9390fa862ea
relation.isOrgUnitOfPublication010157d0-1f75-46b2-ab5b-712e3424b4f5
relation.isOrgUnitOfPublication.latestForDiscovery010157d0-1f75-46b2-ab5b-712e3424b4f5
Файлы
Коллекции