Exploring How to Authenticate Application Messages in MLS: More Efficient, Post-Quantum, and Anonymous Blocklistable

Keitaro Hashimoto

34th USENIX Security Symposium (USENIX Security '25) · Day 3 · Crypto 4: Systems and Protocols