End-to-end security: when do we have it?

Abstract

When two parties, Alice and Bob, engage in a communication that is intended to be private, whether it be a face-to-face conversation, a phone conversation, a chat using a messaging app, or an exchange of emails, they would like the assurance that their communication remains confidential. Thus, no party, other than Alice and Bob, should be able to learn the contents of their communications—not even the messaging service provider. This desirable security property is called end-to-end security, and it can be provided by using end-to-end encryption, i.e., by using an encryption scheme in such a way that only Alice and Bob can decrypt the messages that the other party has sent.

Keywords: cryptography

Reference

Alfred Menezes, Douglas Stebila. End-to-end security: when do we have it?. , vol. 19, pp. 60–64Technical report. IEEE, July–August 2021. © IEEE.

Download

BibTeX