Modern email and instant messaging applications often offer private communications. In doing so, they share common concerns about how security and privacy can be compromised, how they should face similar threats, and how to comply with comparable system requirements. Assuming a scenario where servers may not be trusted, we review and analyze a list of threats specifically against message delivering, archiving, and contact synchronization. We also describe a list of requirements intended for whom undertakes the task of implementing secure and private messaging. The cryptographic solutions available to mitigate the threats and to comply with the requirements may differ, as the two applications are built on different assumptions and technologies.
CITATION STYLE
Symeonidis, I., & Lenzini, G. (2020). Systematization of Threats and Requirements for Private Messaging with Untrusted Servers: The Case of e-Mailing and Instant Messaging. In International Conference on Information Systems Security and Privacy (pp. 593–602). Science and Technology Publications, Lda. https://doi.org/10.5220/0009003805930602
Mendeley helps you to discover research relevant for your work.