In this paper we first analyse the possibility for deniability under a strong adversary, who has an Internet-wide transcript of the communication. Secondly, we present a scheme which provides the desirable properties of previous messaging schemes, but with stronger deniability under the new adversary model. Our scheme requires physical meetings for exchanges of large amounts of random key-material via near-field communication and later uses this random data to key a one-time pad for text-messaging. We prove the correctness of the protocol and, finally, we evaluate the practical feasibility of the suggested scheme.
CITATION STYLE
Bosk, D., Kjellqvist, M., & Buchegger, S. (2015). Towards perfectly secure and deniable communication using an NFC-based key-exchange scheme. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9417, pp. 72–87). Springer Verlag. https://doi.org/10.1007/978-3-319-26502-5_6
Mendeley helps you to discover research relevant for your work.