CONIKS - Bringing Key Transparency to End Users

CONIKS - Bringing Key Transparency to End Users

USENIX via YouTube Direct link

Intro

1 of 25

1 of 25

Intro

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

CONIKS - Bringing Key Transparency to End Users

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 E2E Encrypted Communication Today
  3. 3 Unsolved: How do users establish trust?
  4. 4 Out-of-Band Trust Est. = Unintuitive
  5. 5 Trust Est. by the Provider - Better?
  6. 6 Malicious Provider can Equivocate
  7. 7 Pros/Cons of Existing Trust Establishment
  8. 8 Ideal Trust Establishment Properties
  9. 9 Existing Approach: Verifying Correctness
  10. 10 Our Approach: Verifying Consistency
  11. 11 Solution: CONIKS
  12. 12 CONIKS - Registering a Key
  13. 13 CONIKS-Learning a User's Key
  14. 14 Strawman Consistency Checks: Verify All Bindings
  15. 15 CONIKS: Efficient Checks thru "Summaries"
  16. 16 CONIKS - Main Security Properties
  17. 17 1. Expected Bindings incl. in STR - Auth Paths
  18. 18 1. Checking Inclusion - Verify Auth Path
  19. 19 2. Non-Equivocation - STR History
  20. 20 2. Non-Equivocation - Clients see same STRS
  21. 21 2. Checking Non-Equivocation - Cross-Verification
  22. 22 Privacy Challenges in CONIKS
  23. 23 Main Performance Questions
  24. 24 CONIKS' Performance is Practical!
  25. 25 Conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.