{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T14:37:46Z","timestamp":1774967866732,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":62,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3690360","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"4747-4761","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["On the Tight Security of the Double Ratchet"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9379-1678","authenticated-orcid":false,"given":"Daniel","family":"Collins","sequence":"first","affiliation":[{"name":"Purdue University &amp; Georgia Tech, West Lafayette, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4990-0929","authenticated-orcid":false,"given":"Doreen","family":"Riepel","sequence":"additional","affiliation":[{"name":"UC San Diego, La Jolla, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-0453-2629","authenticated-orcid":false,"given":"Si An Oliver","family":"Tran","sequence":"additional","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2024. Signal Repository. https:\/\/github.com\/signalapp."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-030--90456--2_8"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17653-2_5"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-030--56784-"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484820"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-030--64378--2_10"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-030--26951--7_10"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--662--46494--6_26"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--662--49896--5_10"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--981--99--8733--7_10"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-030--64840--4_21"},{"key":"e_1_3_2_1_12_1","volume-title":"Encryption and Authenticated Key Exchange. In ASIACRYPT 2024 (LNCS).","author":"Bellare Mihir","year":"2024","unstructured":"Mihir Bellare, Doreen Riepel, Stefano Tessaro, and Yizhao Zhang. 2024. Count Corruptions, Not Users: Improved Tightness for Signatures, Encryption and Authenticated Key Exchange. In ASIACRYPT 2024 (LNCS)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/3--540--48329--2_21"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/225058.225084"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--319-"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53018-4_10"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-031--22365--5_8"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-15802-5_27"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3616615"},{"key":"e_1_3_2_1_20_1","volume-title":"EuroS&P","author":"Bos Joppe","unstructured":"Joppe Bos, L\u00e9o Ducas, Eike Kiltz, Tancr\u00e8de Lepoint, Vadim Lyubashevsky, John M Schanck, Peter Schwabe, Gregor Seiler, and Damien Stehl\u00e9. 2018. CRYSTALSKyber: a CCA-secure module-lattice-based KEM. In EuroS&P. IEEE."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--319--78381--9_18"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-031--15979--4_1"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-030-"},{"key":"e_1_3_2_1_25_1","unstructured":"Daniel Collins Doreen Riepel and Si An Oliver Tran. 2024. On the Tight Security of the Double Ratchet. Cryptology ePrint Archive. https:\/\/eprint.iacr.org\/ https:\/\/eprint.iacr.org\/."},{"key":"e_1_3_2_1_26_1","volume-title":"USENIX Security","author":"Cremers Cas","year":"2021","unstructured":"Cas Cremers, Britta Hale, and Konrad Kohbrok. 2021. The Complexities of Healing in Secure Group Messaging: Why Cross-Group Effects Matter. In USENIX Security 2021, Michael Bailey and Rachel Greenstadt (Eds.). USENIX Association, 1847-- 1864."},{"key":"e_1_3_2_1_27_1","unstructured":"Cas Cremers Charlie Jacomme and Aurora Naska. 2023. Formal analysis of session-handling in secure messaging: Lifting security from sessions to conversations. In Usenix Security."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00038"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-07085-3_30"},{"key":"e_1_3_2_1_30_1","volume-title":"Part II (LNCS","volume":"479","author":"Davis Hannah","year":"2021","unstructured":"Hannah Davis and Felix G\u00fcnther. 2021. Tighter Proofs for the SIGMA and TLS 1.3 Key Exchange Protocols. In ACNS 21International Conference on Applied Cryptography and Network Security, Part II (LNCS, Vol. 12727), Kazue Sako and Nils Ole Tippenhauer (Eds.). Springer, Cham, 448--479. https:\/\/doi.org\/10.1007\/ 978--3-030--78375--4_18"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-021-09388-x"},{"key":"e_1_3_2_1_32_1","unstructured":"Benjamin Dowling and Britta Hale. 2023. Authenticated Continuous Key Agreement: Active MitM Detection and Prevention. Cryptology ePrint Archive Paper 2023\/228. https:\/\/eprint.iacr.org\/2023\/228 https:\/\/eprint.iacr.org\/2023\/228."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-20951-3_3"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1080\/24701475.2019.1654697"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--319--96881-0_4"},{"key":"e_1_3_2_1_36_1","unstructured":"Google. 2022. Messages End-to-End Encryption - Overview: Technical Paper. Version 1.2. https:\/\/www.gstatic.com\/messages\/papers\/messages_e2ee.pdf. https: \/\/www.gstatic.com\/messages\/papers\/messages_e2ee.pdf."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-030--84259--8_23"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-38554-4_22"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243816"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70500-2_12"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--319--96884--1_2"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-030--77870--5_5"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-"},{"key":"e_1_3_2_1_45_1","unstructured":"jlund. 2018. Technology preview: Sealed sender for Signal. https:\/\/signal.org\/ blog\/sealed-sender\/"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-30872-7_25"},{"key":"e_1_3_2_1_47_1","unstructured":"Ehren Kret and Rolfe Schmidt. 2023. The PQXDH Key Agreement Protocol. https:\/\/signal.org\/docs\/specifications\/pqxdh\/pqxdh.pdf."},{"key":"e_1_3_2_1_48_1","unstructured":"Moxie Marlinspike. 2016. The Double Ratchet Algorithm. https:\/\/signal. org\/docs\/specifications\/doubleratchet\/. https:\/\/signal.org\/docs\/specifications\/ doubleratchet\/"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"crossref","unstructured":"Ian Martiny Gabriel Kaptchuk Adam J Aviv Daniel S Roche and Eric Wustrow. 2021. Improving Signals Sealed Sender.. In NDSS.","DOI":"10.14722\/ndss.2021.24180"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/11586821_1"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/3--540--68697--5_21"},{"key":"e_1_3_2_1_52_1","unstructured":"Meta. 2017. Messenger Secret Conversations: Technical Whitepaper. Version 2.0. https:\/\/about.fb.com\/wp-content\/uploads\/2016\/07\/messenger-secretconversations- technical-whitepaper.pdf."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45708-9_8"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-58754-2_3"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-031--38554--4_20"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--981--99--8730--6_13"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--319--78372--7_17"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1007\/3--540--69053-0_18"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"crossref","unstructured":"Douglas Stebila. 2024. Security analysis of the iMessage PQ3 protocol. Cryptology ePrint Archive Paper 2024\/357. https:\/\/eprint.iacr.org\/2024\/357 https:\/\/eprint.iacr.org\/2024\/357.","DOI":"10.46586\/tosc.v2024.i1.357-411"},{"key":"e_1_3_2_1_61_1","unstructured":"WhatsApp. 2023. WhatsApp Encryption Overview: Technical white paper. https:\/\/www.whatsapp.com\/security\/WhatsApp-Security-Whitepaper.pdf."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-030--58208--1_11"}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","location":"Salt Lake City UT USA","acronym":"CCS '24","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3690360","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3690360","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T06:04:23Z","timestamp":1755842663000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3690360"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":62,"alternative-id":["10.1145\/3658644.3690360","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3690360","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}