@inproceedings{discovery10068168,
         journal = {Proceedings of the ACM Conference on Computer and Communications Security},
       publisher = {ACM},
           title = {ClaimChain: Improving the security and privacy of in-band key distribution for messaging},
            year = {2018},
          series = {Workshop on Privacy in the Electronic Society (WPES')},
           month = {October},
           pages = {86--103},
       booktitle = {Proceeding of Workshop on Privacy in the Electronic Society 2018 (WPES'18)},
         address = {Toronto, Canada},
            note = {This version is the author accepted manuscript. For information on re-use, please refer to the publisher's terms and conditions.},
          volume = {2018},
             url = {https://doi.org/10.1145/3267323.3268947},
            issn = {1543-7221},
        abstract = {The social demand for email end-to-end encryption is barely supported bymainstream service providers. Autocryptisa new community-driven open specification for e-mail encryption that attempts to respond to this demand. In Autocrypt the encryption keys are attached directly to messages, and thus the encryption can be implemented by email clients without any collaboration of the providers. The decentralized nature of this in-band key distribution, however, makes it prone to man-in-the-middle attacks and can leak the social graph of users. To address this problem we introduce ClaimChain, a cryptographic construction for privacy-preserving authentication of public keys. Users store claims about their identities and keys, as well as their beliefs about others, in ClaimChains. These chains form authenticated decentralized repositories that enable users to prove the authenticity of both their keys and the keys of their contacts. ClaimChains are encrypted, and therefore protect the stored information, such as keys and contact identities, from prying eyes. At the same time, ClaimChain implements mechanisms to provide strong non-equivocation properties, discouraging malicious actors from distributing conflicting or inauthentic claims. We implemented ClaimChain and we show that it offers reasonable performance, low overhead, and authenticity guarantees.},
          author = {Kulynych, B and Lueks, W and Isaakidis, M and Danezis, G and Troncoso, C}
}