Cryptology ePrint Archive: Report 2018/920

A Message Franking Channel

LoÔs Huguenin-Dumittan and Iraklis Leontiadis

Abstract: We pursue to formalize and instantiate a secure bidirectional channel with message franking properties. Under this model a sender may send an abusive message to the receiver and the latter wish to open it in a verifiable way to a third party. Potential malicious behavior of a sender requires message franking protocols resistant to sending messages that cannot be opened later by the receiver. An adversary impersonated by the receiver may also try to open messages that have not been sent by the sender. Wrapping a message franking protocol in a secure channel requires a more delicate treatment in order to avoid drops or replay of messages and out-of-order delivery. To the best of our knowledge we are the first to model the security of a message franking channel, which apart from integrity, confidentiality, resistance to drops, relays and out-of-order delivery is sender and receiver binding: a sender cannot send a message which cannot be opened in a verifiable way later by the receiver, and the receiver cannot claim a message that had not been truly sent by the receiver. Finally, we instantiate a bidirectional message franking channel from symmetric primitives and analyze its security.

Category / Keywords: message franking channel, secure communication, channel security, abusive verifiable reports

Date: received 27 Sep 2018

Contact author: iraklis leontiadis at epfl ch

Available format(s): PDF | BibTeX Citation

Version: 20181002:035509 (All versions of this report)

Short URL: ia.cr/2018/920


[ Cryptology ePrint archive ]