Exploring how to authenticate application messages in MLS: More efficient, post-quantum, and anonymous blocklistable

Hashimoto K, Katsumata S, Pascual Perez G. 2025. Exploring how to authenticate application messages in MLS: More efficient, post-quantum, and anonymous blocklistable. 34th Usenix Security Symposium. USENIX: Security Symposium, 6699–6716.

Download
OA 2025_Usenix_Hashimoto.pdf 710.73 KB [Published Version]
Download (ext.)
OA https://eprint.iacr.org/2025/426 [Published Version]
Conference Paper | Published | English

Scopus indexed
Author
Hashimoto, Keitaro; Katsumata, Shuichi; Pascual Perez, GuillermoISTA

Corresponding author has ISTA affiliation

Abstract
The Message Layer Security (MLS) protocol has recently been standardized by the IETF. MLS is a scalable secure group messaging protocol expected to run more efficiently compared to the Signal protocol at scale, while offering a similar level of strong security. Even though MLS has undergone extensive examination by researchers, the majority of the works have focused on confidentiality. In this work, we focus on the authenticity of the application messages exchanged in MLS. Currently, MLS authenticates every application message with an EdDSA signature and while manageable, the overhead is greatly amplified in the post-quantum setting as the NIST-recommended Dilithium signature results in a 40x increase in size. We view this as an invitation to explore new authentication modes that can be used instead. We start by taking a systematic view on how application messages are authenticated in MLS and categorize authenticity into four different security notions. We then propose several authentication modes, offering a range of different efficiency and security profiles. For instance, in one of our modes, COSMOS++, we replace signatures with one-time tokens and a MAC tag, offering roughly a 75x savings in the post-quantum communication overhead. While this comes at the cost of weakening security compared to the authentication mode used by MLS, the lower communication overhead seems to make it a worthwhile trade-off with security.
Publishing Year
Date Published
2025-01-01
Proceedings Title
34th Usenix Security Symposium
Publisher
Usenix Association
Acknowledgement
This research was partially supported by JST CREST JPMJCR22M1, Japan and funded by the European Union’s Horizon 2020 research and innovation programme under the Marie Skłodowska-Curie Grant Agreement No.665385.
Page
6699-6716
Conference
USENIX: Security Symposium
Conference Location
Seattle, WA, USA
Conference Date
2025-08-13 – 2025-08-15
IST-REx-ID

Cite this

Hashimoto K, Katsumata S, Pascual Perez G. Exploring how to authenticate application messages in MLS: More efficient, post-quantum, and anonymous blocklistable. In: 34th Usenix Security Symposium. Usenix Association; 2025:6699-6716.
Hashimoto, K., Katsumata, S., & Pascual Perez, G. (2025). Exploring how to authenticate application messages in MLS: More efficient, post-quantum, and anonymous blocklistable. In 34th Usenix Security Symposium (pp. 6699–6716). Seattle, WA, USA: Usenix Association.
Hashimoto, Keitaro, Shuichi Katsumata, and Guillermo Pascual Perez. “Exploring How to Authenticate Application Messages in MLS: More Efficient, Post-Quantum, and Anonymous Blocklistable.” In 34th Usenix Security Symposium, 6699–6716. Usenix Association, 2025.
K. Hashimoto, S. Katsumata, and G. Pascual Perez, “Exploring how to authenticate application messages in MLS: More efficient, post-quantum, and anonymous blocklistable,” in 34th Usenix Security Symposium, Seattle, WA, USA, 2025, pp. 6699–6716.
Hashimoto K, Katsumata S, Pascual Perez G. 2025. Exploring how to authenticate application messages in MLS: More efficient, post-quantum, and anonymous blocklistable. 34th Usenix Security Symposium. USENIX: Security Symposium, 6699–6716.
Hashimoto, Keitaro, et al. “Exploring How to Authenticate Application Messages in MLS: More Efficient, Post-Quantum, and Anonymous Blocklistable.” 34th Usenix Security Symposium, Usenix Association, 2025, pp. 6699–716.
All files available under the following license(s):
Copyright Statement:
This Item is protected by copyright and/or related rights. [...]
Main File(s)
File Name
Access Level
OA Open Access
Date Uploaded
2025-11-24
MD5 Checksum
fcfe8851aeb751af98c0b1335a0ef149


Link(s) to Main File(s)
Access Level
OA Open Access

Export

Marked Publications

Open Data ISTA Research Explorer

Search this title in

Google Scholar
ISBN Search