O2TR: Offline OTR messaging system under network disruption
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Daghmehchi Firoozjaei, M.[Daghmehchi Firoozjaei, M.] | - |
dc.contributor.author | Kim, M.[Kim, M.] | - |
dc.contributor.author | Song, J.[Song, J.] | - |
dc.contributor.author | Kim, H.[Kim, H.] | - |
dc.date.accessioned | 2021-07-29T05:45:33Z | - |
dc.date.available | 2021-07-29T05:45:33Z | - |
dc.date.created | 2019-11-29 | - |
dc.date.issued | 2019-05 | - |
dc.identifier.issn | 0167-4048 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/skku/handle/2021.sw.skku/15929 | - |
dc.description.abstract | Providing a secure and efficient communication system under network disruption without a trusted third party remains a challenging issue. To develop a secure and efficient system in such situations, we extend the conventional Off-The-Record (OTR) protocol into a new protocol named offline OTR (O2TR). O2TR provides end-to-end security between users without requiring the assumption that they are persistently connected to each other. To show the feasibility of the proposed protocol, we implemented a prototype to support O2TR based on the Gajim XMMP instant messaging platform. Our experiments showed that O2TR can be used reliably even when the corresponding network party is temporarily broken down. Moreover, O2TR provides an efficient way to resume private sessions which is about 34% faster than the original OTR. We also proved the secrecy of O2TR using an automated verification tool called AVISPA. © 2018 Elsevier Ltd | - |
dc.publisher | Elsevier Ltd | - |
dc.title | O2TR: Offline OTR messaging system under network disruption | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Daghmehchi Firoozjaei, M.[Daghmehchi Firoozjaei, M.] | - |
dc.contributor.affiliatedAuthor | Kim, M.[Kim, M.] | - |
dc.contributor.affiliatedAuthor | Kim, H.[Kim, H.] | - |
dc.identifier.doi | 10.1016/j.cose.2018.12.013 | - |
dc.identifier.scopusid | 2-s2.0-85059821873 | - |
dc.identifier.wosid | 000459525800014 | - |
dc.identifier.bibliographicCitation | Computers and Security, v.82, pp.227 - 240 | - |
dc.relation.isPartOf | Computers and Security | - |
dc.citation.title | Computers and Security | - |
dc.citation.volume | 82 | - |
dc.citation.startPage | 227 | - |
dc.citation.endPage | 240 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 3 | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.subject.keywordPlus | SECURITY | - |
dc.subject.keywordAuthor | Key management | - |
dc.subject.keywordAuthor | OTR | - |
dc.subject.keywordAuthor | Privacy-preserving | - |
dc.subject.keywordAuthor | Reliability | - |
dc.subject.keywordAuthor | Security | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(03063) 25-2, SUNGKYUNKWAN-RO, JONGNO-GU, SEOUL, KOREAsamsunglib@skku.edu
COPYRIGHT © 2021 SUNGKYUNKWAN UNIVERSITY ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.