Hi,

I'm studying the mpOTR design and would have some questions regarding
algorithm 4 and some other questions regarding chapter 3.2.3 of the  paper:
http://www.cypherpunks.ca/~iang/pubs/mpotr.pdf

- Is denAKE(A,B) equal or similar to the OTR protocol? (if that is not
the case where can I find more information about denAKE)
- Is k the encryption key and km the key for the MAC?
- If that is the case, why is km in line 4 (Send(B, SymEnc(Sign())..))
used if there is no MAC (just SymEnc)?


Regarding the deniability in the case where a
judge forces participants of a chat session (c1) to disclose their long
term private keys:

From chapter 3.2.3:
"
Our privacy requirement is stronger than the settings presented in [11,
12] because J must not be able to distinguish between Alice’s
transcripts and forgeries even if J gets Alice’s long-term secrets.
"

later on:
"
We accept that users cannot convincingly
deny their static secrets in order to achieve a less compli-
cated protocol. The users can still deny taking part in any
fixed chatroom and the content of messages that they sent.
"

My question:
Is this last sentence true, even if a judge gets the long-term keys of
all participants of a given chat session, or was the requirement in
chapter 3.2.3 sacrified for a "less complicated" design?

I found some slides of talk at CCS:
http://goliath.cs.ucdavis.edu/~matt/pubs/mpotr-ccs09/mpotr-ccs09-slides.pdf
Does someone know if this talk is available somewhere?

kind regards,
Christoph

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
OTR-users mailing list
OTR-users@lists.cypherpunks.ca
http://lists.cypherpunks.ca/mailman/listinfo/otr-users

Reply via email to