Circumventing Cryptographic Deniability with Remote Attestation
dc.contributor | Aalto-yliopisto | fi |
dc.contributor | Aalto University | en |
dc.contributor.author | Gunn, Lachlan | en_US |
dc.contributor.author | Vieitez Parra, Ricardo | en_US |
dc.contributor.author | Asokan, N. | en_US |
dc.contributor.department | Department of Computer Science | en |
dc.contributor.groupauthor | Adj. Prof Asokan N. group | en |
dc.contributor.groupauthor | Helsinki Institute for Information Technology (HIIT) | en |
dc.contributor.organization | Department of Computer Science | en_US |
dc.date.accessioned | 2019-09-20T11:10:19Z | |
dc.date.available | 2019-09-20T11:10:19Z | |
dc.date.issued | 2019-07-12 | en_US |
dc.description.abstract | Deniable messaging protocols allow two parties to have ‘off-the-record’ conversations without leaving any record that can convince external verifiers about what either of them said during the conversation. Recent events like the Podesta email dump underscore the importance of deniable messaging to politicians, whistleblowers, dissidents and many others. Consequently, messaging protocols like Signal and OTR are designed with cryptographic mechanisms to ensure deniable communication, irrespective of whether the communications partner is trusted. Many commodity devices today support hardware assisted remote attestation which can be used to convince a remote verifier of some property locally observed on the device. We show how an adversary can use remote attestation to undetectably generate a non-repudiable transcript from any deniable protocol (including messaging protocols) providing sender authentication, proving to skeptical verifiers what was said. We describe a concrete implementation of the technique using the Signal messaging protocol. We then show how to design protocols that are deniable even against an adversary capable of attestation, and in particular how attestation itself can be used to restore deniability by thwarting realistic classes of adversary. | en |
dc.description.version | Peer reviewed | en |
dc.format.extent | 350–369 | |
dc.format.mimetype | application/pdf | en_US |
dc.identifier.citation | Gunn, L, Vieitez Parra, R & Asokan, N 2019, Circumventing Cryptographic Deniability with Remote Attestation . in Proceedings on Privacy Enhancing Technologies . Proceedings on Privacy Enhancing Technologies, no. 3, vol. 2019, De Gruyter, pp. 350–369, Privacy Enhancing Technologies Symposium, Stockholm, Sweden, 16/07/2019 . https://doi.org/10.2478/popets-2019-0051 | en |
dc.identifier.doi | 10.2478/popets-2019-0051 | en_US |
dc.identifier.issn | 2299-0984 | |
dc.identifier.other | PURE UUID: 42805f66-0157-4e15-9d41-4967f4a99cef | en_US |
dc.identifier.other | PURE ITEMURL: https://research.aalto.fi/en/publications/42805f66-0157-4e15-9d41-4967f4a99cef | en_US |
dc.identifier.other | PURE FILEURL: https://research.aalto.fi/files/36874074/_22990984_Proceedings_on_Privacy_Enhancing_Technologies_Circumventing_Cryptographic_Deniability_with_Remote_Attestation.pdf | en_US |
dc.identifier.uri | https://aaltodoc.aalto.fi/handle/123456789/40300 | |
dc.identifier.urn | URN:NBN:fi:aalto-201909205326 | |
dc.language.iso | en | en |
dc.publisher | De Gruyter | |
dc.relation.ispartof | Privacy Enhancing Technologies Symposium | en |
dc.relation.ispartofseries | Proceedings on Privacy Enhancing Technologies | en |
dc.relation.ispartofseries | Volume 2019, issue 3 | en |
dc.rights | openAccess | en |
dc.title | Circumventing Cryptographic Deniability with Remote Attestation | en |
dc.type | A4 Artikkeli konferenssijulkaisussa | fi |
dc.type.version | publishedVersion |