Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

K-Waay: Fast and Deniable Post-Quantum X3DH without Ring Signatures

USENIX via YouTube

Overview

Learn about a groundbreaking security protocol presentation from USENIX Security '24 that introduces an efficient post-quantum alternative to the X3DH key exchange protocol used in messaging apps like WhatsApp. Explore how the proposed K-Waay protocol achieves quantum security without relying on ring signatures, while maintaining crucial features like asynchronicity and deniability. Discover the innovative use of split-KEM primitive and its implementation based on the Frodo key exchange protocol, offering significant performance improvements over existing solutions. Understand the theoretical foundations, security proofs, and benchmarking results that demonstrate K-Waay's superior efficiency even with conservative parameter choices and plain LWE assumptions.

Syllabus

USENIX Security '24 - K-Waay: Fast and Deniable Post-Quantum X3DH without Ring Signatures

Taught by

USENIX

Reviews

Start your review of K-Waay: Fast and Deniable Post-Quantum X3DH without Ring Signatures

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.