A Non-Interactive Key-Evolving Protocol to Provide the Intrusion Resilience

1Citations
Citations of this article
N/AReaders
Mendeley users who have this article in their library.
Get full text

Abstract

Key-evolving techniques defend from secret key exposures and allow to extend the basic properties of cryptographic schemes by updating the keys time after time. The intrusion resilience is an example of properties that can be achieved by the use of this concept. Intrusion-resilient cryptosystems imply the presence of a sequence of keys for different time periods and allow to provide the security of unexposed secret keys even if a subset of secret keys of that sequence is compromised. In this paper, we propose a generic construction over underlying key exchange and digital signature schemes that allows to achieve the security level comparable to intrusion-resilient cryptosystems. The proposed key-evolving protocol is intended to use in systems, where a direct interactive channel between users can be absent and the frequency of message exchange is relatively small (for example, like in e-mail applications), so it is not possible to apply usual interactive methods providing the intrusion resilience. The protocol described in this paper allows to provide an adequate security level in terms of key evolving in systems with limited possibilities to perform interactive cryptographic protocols.

Cite

CITATION STYLE

APA

Panasenko, S. (2023). A Non-Interactive Key-Evolving Protocol to Provide the Intrusion Resilience. In Proceedings - 2023 12th IEEE International Conference on Communication Systems and Network Technologies, CSNT 2023 (pp. 682–688). Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/CSNT57126.2023.10134723

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free