Mon, 09 Mar 2026 13:00 Introduction to Deniable Authentication: Goals, Setting and Requirements by Guilherme Rito (Ruhr University Bochum)

Deniable authentication is a highly desirable property for secure communication: it allows a sender Alice to authentically transmit messages to a designated receiver Bob in such a way that only Bob gets convinced that Alice indeed sent these messages. In particular, it guarantees that even if Bob tries to convince a (non-designated) party Judy that Alice sent some message, and even if Bob gives Judy his own secret key, Judy will not be convinced because as far as she knows Bob could be making it all up!

This talk will give an introduction to deniable authentication and present some current challenges in the area.

We will introduce two main technical instantiations of deniable authentication---Designated Verifier Signatures and Ring Signatures. As we do so, we will identify a (particularly unique) setup requirement of deniable authentication, namely, that dishonest parties must know their secret keys. To enforce this, we introduce a Key-Registration procedure that (we show) is sufficient for deniable authentication. It guarantees, roughly, that if a user’s key registration is successful, then the user can extract by themselves a valid secret key from their interaction with the registration authority. We explain why this setup seems inherently necessary by listing a series of (simple) attacks that void deniability. Each of these attacks consists of a user successfully registering a public key for which it can convincingly claim it does not know a valid (corresponding) secret key. Finally, we will discuss some of the current challenges in bringing deniable authentication into practice.

Speaker Bio:

Guilherme Rito is a postdoctoral researcher at Ruhr University Bochum, in the group of Eike Kiltz. He received his Ph.D. from ETH Zurich under the supervision of Ueli Maurer.

His research interests lie broadly in cryptography. Recently, he has been focusing on deniable authentication and consistency guarantees for broadcast encryption schemes.

Venue: Online