Back to Results
First PageMeta Content
Deniable authentication / Off-the-Record Messaging / Diffie–Hellman key exchange / Cryptographic hash function / Alice and Bob / Digital signature / Cryptography / Cryptographic protocols / Public-key cryptography


Multi-party Off-the-Record Messaging Ian Goldberg ˘ Berkant Ustaoglu
Add to Reading List

Document Date: 2009-08-01 14:09:59


Open Document

File Size: 259,17 KB

Share Result on Facebook

City

Chicago / /

Country

United States / /

Currency

USD / pence / /

/

Event

Person Communication and Meetings / /

Facility

Computer Science University of California / Computer Science University of Waterloo Waterloo / /

IndustryTerm

mpOTR protocol / authenticated protocols / Client software / virtual server / n-party interactive protocol / transport protocol / on-line and face-to-face scenarios / agreement protocol / dishonest server / through authentication protocols / Online communication systems / asynchronous networks / less complicated protocol / cryptographic algorithms / above protocols / ad hoc / law enforcement / online world / consensus-ensuring algorithms / application layer protocols / online multi-party conversations / typical key group key agreement protocol / Internet Relay Chat / signature exchange protocol / on-line chats / law enforcement officers / Internet Charlie / deniable authenticated key agreement protocol / open-source software developers / Internet eavesdropping / /

Organization

Pi / IM / Mallory / Berkant Ustaoglu David R. Cheriton School / X. Input / P1 / Navy / Alice / Computer Science University of Waterloo Waterloo / Japan Department / Deniable Signature Key Exchange / Charlie / USA Department / X. On / University of California / Davis / /

Person

Charlie / Bob / Furthermore / Eve / Ian Goldberg / Mannan Oorschot / Matthew D. Van Gundy Hao Chen / Dave / Alice / Van Oorschot / Alexander / /

Position

last player / alleged author / ciphertext author / author / IND-CPA / Forward / malicious player / model for private communication / Private / judge / /

ProvinceOrState

Illinois / /

Technology

application layer protocols / typical IM protocols / secure / deniable authenticated key agreement protocol / prescribed protocol / key exchange protocol / n-party interactive protocol / signature exchange protocol / instant messaging / secret key / deniable two-party key agreement protocol / encryption / SOLUTION DESIGN The mpOTR protocol / virtual server / less complicated protocol / two-party algorithm / above protocols / implicitly authenticated protocols / key agreement protocol / Data Encryption / private key / consensus-ensuring algorithms / KleeQ-like algorithms / public key / video conferencing / transport protocol / mpOTR protocol / Network Protocols / through authentication protocols / /

SocialTag