Cryptology ePrint Archive: Report 2018/920
A Message Franking Channel
Loïs Huguenin-Dumittan and Iraklis Leontiadis
Abstract: We pursue to formalize and instantiate a secure bidirectional channel with message franking properties. Under this model a sender may send an abusive message to the receiver and the latter wish to open it in a verifiable way to a third party. Potential malicious behavior of a sender requires message franking protocols resistant to sending messages that cannot be opened later by the receiver. An adversary impersonated by the receiver may also try to open messages that have not been sent by the sender. Wrapping a message franking protocol in a secure channel requires a more delicate treatment in order to avoid drops or replay of messages and out-of-order delivery. To the best of our knowledge we are the first to model the security of a message franking channel, which apart from integrity, confidentiality, resistance to drops, relays and out-of-order delivery is sender and receiver binding: a sender cannot send a message which cannot be opened in a verifiable way later by the receiver, and the receiver cannot claim a message that had not been truly sent by the receiver. Finally, we instantiate a bidirectional message franking channel from symmetric primitives and analyze its security.
Category / Keywords: message franking channel, secure communication, channel security, abusive verifiable reports
Date: received 27 Sep 2018
Contact author: iraklis leontiadis at epfl ch
Available format(s): PDF | BibTeX Citation
Version: 20181002:035509 (All versions of this report)
Short URL: ia.cr/2018/920
[ Cryptology ePrint archive ]