Security Analysis of End-to-End Encryption for Zoom Meetings.
Takanori IsobeRyoma ItoPublished in: IACR Cryptol. ePrint Arch. (2021)
Keyphrases
- end to end
- security analysis
- encryption scheme
- security properties
- key exchange
- encryption algorithm
- image encryption
- high security
- elliptic curve cryptography
- mutual authentication
- smart card
- public key
- security requirements
- authentication protocol
- wireless ad hoc networks
- private key
- congestion control
- user authentication
- ad hoc networks
- multipath
- authentication scheme
- ciphertext
- real time
- secret key
- image quality
- public key cryptography
- low cost
- image sequences