Skip to main content

Online Conversation Application with Confidentiality, Anonymity, and Identity Requirements

  • Conference paper
  • First Online:
Ambient Intelligence– Software and Applications – 8th International Symposium on Ambient Intelligence (ISAmI 2017) (ISAmI 2017)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 615))

Included in the following conference series:

  • 786 Accesses

Abstract

The increase in usage of smartphones and the ubiquity of Internet access have made mobile communications services very attractive to users. Messaging services are among the most popular services on the Internet. In recent years, this services started to support confidentiality and anonymity. A recurrent problem with the existing messaging solutions is their lack of resistance to impersonation attacks. The proposed solution addresses the impersonation problem, without neglecting user confidentiality and anonymity, by forcing users to exchange the required cryptographic material among themselves. Moreover, this exchange must use a proximity communication technology, forcing the users to physically meet.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Calderbank, M.: The RSA Cryptosystem: History, Algorithm, Primes (2007)

    Google Scholar 

  2. Demircioglu, M., Taskın, H.K., Sarımurat, S.: Security analysis of the encrypted mobile communication applications (2014)

    Google Scholar 

  3. Electronic Frontier Foundation: Secure messaging scorecard. Which apps and tools actually keep your messages safe?. Accessed 11 Sept 2016

    Google Scholar 

  4. Electronic Frontier Foundation, Julia, A., Joseph, B.: Secure Messaging Scorecard. https://www.eff.org/secure-messaging-scorecard (2014)

  5. Gaurav, R.: How WhatsApp Works. http://digitalperiod.com/explore-whatsapp-clock-sign-and-tick/ (2015)

  6. Greenberg, A.: Hacker Lexicon: What Is End-to-End Encryption?. In: WIRED (2015). Accessed 17 Mar 2016

    Google Scholar 

  7. Inc, W.: How Wickr’s Encryption Works. https://www.wickr.com/security/how-it-works. Accessed 17 Feb 2016

  8. Pedersen, C., Dahl, D.: Crypton: Zero-Knowledge Application Framework (2014). Accessed 2 Mar 2016

    Google Scholar 

  9. Play, G.: TextSecure Private Messenger. Accessed 17 Feb 2016

    Google Scholar 

  10. Sun, L.: Facebook Inc.’s WhatsApp Hits 900 Million Users: What Now?. The Motley Fool. http://www.fool.com/investing/general/2015/09/11/facebook-incs-whatsapp-hits-900-million-users-what.aspx (2015)

  11. Systems, O.W.: Advanced cryptographic ratcheting. https://whispersystems.org/blog/advanced-ratcheting/. Accessed 28 Sept 2016

  12. Tactical Technology Collective and Front Line Defenders: TextSecure for Android, security in-a-box. https://securityinabox.org/en/guide/textsecure/android (2009)

  13. TechCrunch. AOL: Talk Private to Me: Free, Worldwide, Encrypted Voice Calls with Signal for iPhone. Accessed 13 Sept 2016

    Google Scholar 

  14. Telegram: Mtproto mobile protocol

    Google Scholar 

  15. The Zfone Project: Exactly how does Zfone and ZRTP protect against a man-in-the-middle (MiTM) attack?. Accessed 13 Sept 2016

    Google Scholar 

  16. Threema GmbH: Threema

    Google Scholar 

  17. Threema GmbH: Threema Cryptography Whitepaper. https://threema.ch/en/faq. Accessed 10 Sept 2016

  18. Tilman, F., Christian, M., Christoph, B., Florian, B., Jorg, S., Thorsten, H.: How Secure is TextSecure? (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to António Pinto .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Fernandes, P., Pinto, A. (2017). Online Conversation Application with Confidentiality, Anonymity, and Identity Requirements. In: De Paz, J., Julián, V., Villarrubia, G., Marreiros, G., Novais, P. (eds) Ambient Intelligence– Software and Applications – 8th International Symposium on Ambient Intelligence (ISAmI 2017). ISAmI 2017. Advances in Intelligent Systems and Computing, vol 615. Springer, Cham. https://doi.org/10.1007/978-3-319-61118-1_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-61118-1_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-61117-4

  • Online ISBN: 978-3-319-61118-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics