Completed
Pros/Cons of Existing Trust Establishment
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
CONIKS - Bringing Key Transparency to End Users
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 E2E Encrypted Communication Today
- 3 Unsolved: How do users establish trust?
- 4 Out-of-Band Trust Est. = Unintuitive
- 5 Trust Est. by the Provider - Better?
- 6 Malicious Provider can Equivocate
- 7 Pros/Cons of Existing Trust Establishment
- 8 Ideal Trust Establishment Properties
- 9 Existing Approach: Verifying Correctness
- 10 Our Approach: Verifying Consistency
- 11 Solution: CONIKS
- 12 CONIKS - Registering a Key
- 13 CONIKS-Learning a User's Key
- 14 Strawman Consistency Checks: Verify All Bindings
- 15 CONIKS: Efficient Checks thru "Summaries"
- 16 CONIKS - Main Security Properties
- 17 1. Expected Bindings incl. in STR - Auth Paths
- 18 1. Checking Inclusion - Verify Auth Path
- 19 2. Non-Equivocation - STR History
- 20 2. Non-Equivocation - Clients see same STRS
- 21 2. Checking Non-Equivocation - Cross-Verification
- 22 Privacy Challenges in CONIKS
- 23 Main Performance Questions
- 24 CONIKS' Performance is Practical!
- 25 Conclusion