Hubbry Logo
search button
Sign in
Key Transparency
Key Transparency
Comunity Hub
History
arrow-down
starMore
arrow-down
bob

Bob

Have a question related to this hub?

bob

Alice

Got something to say related to this hub?
Share it here.

#general is a chat channel to discuss anything related to the hub.
Hubbry Logo
search button
Sign in
Key Transparency
Community hub for the Wikipedia article
logoWikipedian hub
Welcome to the community hub built on top of the Key Transparency Wikipedia article. Here, you can discuss, collect, and organize anything related to Key Transparency. The purpose of the hub is to connect...
Add your contribution
Key Transparency

Key Transparency allows communicating parties to verify public keys used in end-to-end encryption.[1] In many end-to-end encryption services, to initiate communication a user will reach out to a central server and request the public keys of the user with which they wish to communicate.[2] If the central server is malicious or becomes compromised, a man-in-the-middle attack can be launched through the issuance of incorrect public keys. The communications can then be intercepted and manipulated.[3] Additionally, legal pressure could be applied by surveillance agencies to manipulate public keys and read messages.[2]

With Key Transparency, public keys are posted to a public log that can be universally audited.[4] Communicating parties can verify public keys used are accurate.[4]

See also

[edit]

References

[edit]
  1. ^ Malvai, Harjasleen; Kokoris-Kogias, Lefteris; Sonnino, Alberto; Ghosh, Esha (2023). "Parakeet: Practical Key Transparency for End-to-End Encrypted Messaging". Cryptology ePrint Archive, Paper 2023/081. doi:10.14722/ndss.2023.24545. ISBN 978-1-891562-83-9.
  2. ^ a b Melara, Marcela S., Aaron Blankstein, Joseph Bonneau, Edward W. Felten, and Michael J. Freedman. "{CONIKS}: Bringing key transparency to end users." In 24th USENIX Security Symposium (USENIX Security 15), pp. 383-398. 2015.
  3. ^ Bonneau, Joseph. "EthIKS: Using Ethereum to audit a CONIKS key transparency log." In International Conference on Financial Cryptography and Data Security, pp. 95-105. Berlin, Heidelberg: Springer Berlin Heidelberg, 2016.
  4. ^ a b Chen, Brian, Yevgeniy Dodis, Esha Ghosh, Eli Goldin, Balachandar Kesavan, Antonio Marcedone, and Merry Ember Mou. "Rotatable zero knowledge sets: Post compromise secure auditable dictionaries with application to key transparency." In International Conference on the Theory and Application of Cryptology and Information Security, pp. 547-580. Cham: Springer Nature Switzerland, 2022.