SECURE MESSAGING WITH READ-UNDENIABILITY AND DELETION-VERIFIABILITY
First Claim
1. A method comprising:
- generating a message at a sending computing device;
sending a request for an encryption key from the sending computing device to a receiving computing device through a network, wherein the request includes an identifier of the message;
receiving an encryption key by the sending computing device through the network, wherein the encryption key is bound to a state associated with reading the identified message;
verifying that the state that the encryption key is bound to is the state associated with reading the identified message by the sending computing device; and
if the state that the encryption key is bound to is the state associated with reading the identified message;
encrypting the message using the encryption key by the sending computing device; and
sending the encrypted message to the receiving computing device by the sending computing device through the network.
2 Assignments
0 Petitions
Accused Products
Abstract
A cryptographically-secure component is used to provide read-undeniability and deletion-verifiability for messaging applications. When a messaging application of a sending node desires to send a message to a messaging application of a receiving node, the sending node requests an encryption key from the receiving node. The cryptographically-secure component of the receiving node generates an encryption key that is bound to a state of the receiving node. The messaging application of the sending node encrypts the message using the encryption key and sends the encrypted message to the messaging application of the receiving node. Because the encryption key used to encrypt the message is bound to the state associated with reading the message by the cryptographically-secure component, if the receiving node desires to decrypt and read the encrypted message, the receiving node may advance its state to the bound state to retrieve the decryption key.
-
Citations
20 Claims
-
1. A method comprising:
-
generating a message at a sending computing device; sending a request for an encryption key from the sending computing device to a receiving computing device through a network, wherein the request includes an identifier of the message; receiving an encryption key by the sending computing device through the network, wherein the encryption key is bound to a state associated with reading the identified message; verifying that the state that the encryption key is bound to is the state associated with reading the identified message by the sending computing device; and if the state that the encryption key is bound to is the state associated with reading the identified message; encrypting the message using the encryption key by the sending computing device; and sending the encrypted message to the receiving computing device by the sending computing device through the network. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method comprising:
-
receiving a request for an encryption key from a sending computing device by a receiving computing device through a network, wherein the request includes an identifier of a message; generating an encryption key by the receiving computing device, wherein the encryption key is generated by a cryptographically-secure component of the receiving computing device and is bound to a state associated with reading the identified message; sending the generated encryption key to the sending computing device by the receiving computing device; and receiving an encrypted message by the receiving computing device from the sending computing device, wherein the encrypted message was encrypted by the sending computing device using the encryption key. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system comprising:
-
at least one computing device; a cryptographically-secure component; and a messaging application adapted to; receive a request for an encryption key, wherein the request includes an identifier of a message; generate an encryption key using the cryptographically-secure component, wherein the encryption key is bound to a state associated with reading the identified message; send the generated encryption key; and receive an encrypted message, wherein the encrypted message was encrypted using the encryption key. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification