There are the communicating parties such as the sender and receiver of messages.
Certificate directory / key packet server / trusted public key server
/ public ledger / out of bound
### Messaging operators and network nodes
Are the servers and network nodes who are responsible for message delivery and synchronization.
"Ensuring the distribution of cryptographic long-term keys and proof
of association with the owning entity"
### Third parties
It is any other entity who is interacting with the system.
# Problem areas
## Security Threats and Requirements
### Spoofing and entity authentication
@ -209,7 +214,7 @@ An adversary can sufficiently detect an IOI such as messages exchanged within th
## Information disclosure -- confidentiality
An adversary can disclose information exchanged within the system about users. It can perform a MitM aiming to learn the contents of a message the metadata information such as with whom someone is communicating with and with which frequency. It can be anyone but the users who are communicating such as the trusted key directory, messaging server, and the network nodes. The capabilities of an adversary can be local controlling one entity or channel of the network to a global adversary which can control several entities and communication links. Confidentiality of messages, together with security, needs to be guaranteed with the use of cryptographic operations such as secret sharing, symmetric, asymmetric, or homomorphic encryption.
An adversary can disclose information exchanged within the system about users. It can perform a MitM aiming to learn the contents of a message the metadata information such as with whom someone is communicating with and with which frequency. It can be anyone but the users who are communicating such as the messaging server, and the network nodes. The capabilities of an adversary can be local controlling one entity or channel of the network to a global adversary which can control several entities and communication links. Confidentiality of messages, together with security, needs to be guaranteed with the use of cryptographic operations such as secret sharing, symmetric, asymmetric, or homomorphic encryption.