Strong Forward Security

11Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Forward security has been proposed as a method to minimize the consequences of key exposure. In this paper we analyze this method and consider a vulnerability, which is due to the fact that the exposure may not have been detected. All forward secure cryptosystems proposed so far are vulnerable during the period between key exposure and its detection. We consider the notion of strong forward security in which cryptographically processed data is protected not only for the periods prior to key exposure but also after key exposure, and present two applications with this novel property: a basic public key cryptosystem and an ElGamal-based key escrow scheme. © 2002 Kluwer Academic / Plenum Publishers, New York.

Cite

CITATION STYLE

APA

Burmester, M., Chrissikopoulos, V., Kotzanikolaou, P., & Magkos, E. (2002). Strong Forward Security. In IFIP Advances in Information and Communication Technology (Vol. 65, pp. 109–119). Springer New York LLC. https://doi.org/10.1007/0-306-46998-7_8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free