{TreeSync}: authenticated group management for messaging layer security

T Wallez, J Protzenko, B Beurdouche… - 32nd USENIX Security …, 2023 - usenix.org
Messaging Layer Security (MLS), currently undergoing standardization at the IETF, is an
asynchronous group messaging protocol that aims to be efficient for large dynamic groups …

Cryptographic administration for secure group messaging

D Balbás, D Collins, S Vaudenay - 32nd USENIX Security Symposium …, 2023 - usenix.org
Many real-world group messaging systems delegate group administration to the application
level, failing to provide formal guarantees related to group membership. Taking a …

Signed (group) diffie–hellman key exchange with tight security

J Pan, C Qian, M Ringerud - Journal of Cryptology, 2022 - Springer
We propose the first tight security proof for the ordinary two-message signed Diffie–Hellman
key exchange protocol in the random oracle model. Our proof is based on the strong …

Device-oriented group messaging: a formal cryptographic analysis of matrix'core

MR Albrecht, B Dowling, D Jones - 2024 IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Focusing on its cryptographic core, we provide the first formal description of the Matrix
secure group messaging protocol. Observing that no existing secure messaging model in …

End-to-End Encrypted Zoom Meetings: Proving Security and Strengthening Liveness

Y Dodis, D Jost, B Kesavan, A Marcedone - … International Conference on …, 2023 - Springer
Abstract In May 2020, Zoom Video Communications, Inc.(Zoom) announced a multi-step
plan to comprehensively support end-to-end encrypted (E2EE) group video calls and …

On the worst-case inefficiency of CGKA

A Bienstock, Y Dodis, S Garg, G Grogan… - Theory of Cryptography …, 2022 - Springer
Abstract Continuous Group Key Agreement (CGKA) is the basis of modern Secure Group
Messaging (SGM) protocols. At a high level, a CGKA protocol enables a group of users to …

Algorithm substitution attacks against receivers

M Armour, B Poettering - International Journal of Information Security, 2022 - Springer
This work describes a class of Algorithm Substitution Attack (ASA) generically targeting the
receiver of a communication between two parties. Our work provides a unified framework …

The key lattice framework for concurrent group messaging

K Cong, K Eldefrawy, NP Smart, B Terner - International Conference on …, 2024 - Springer
Today, two-party secure messaging is well-understood and widely adopted, eg, Signal and
WhatsApp. Multiparty protocols for secure group messaging are less mature and many …

Sustainable and round-optimized group authenticated key exchange in vehicle communication

Z Li, M Wang, V Sharma, P Gope - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Vehicle authentication is an essential component validating the vehicle's identity and
ensuring the integrity of transformed data for intelligent transport vehicles (ITS) in the …

Tightly-Secure Group Key Exchange with Perfect Forward Secrecy

E Di Giandomenico, D Riepel, S Schäge - International Conference on the …, 2025 - Springer
In this work, we present a new paradigm for constructing Group Authenticated Key
Exchange (GAKE). This result is the first tightly secure GAKE scheme in a strong security …