On post-compromise security
<p>In this work we study communication with a party whose secrets have already been compromised. At first sight, it may seem impossible to provide any type of security in this scenario. However, under some conditions, practically relevant guarantees can still be achieved. We call such guarante...
Main Authors: | Cohn-Gordon, K, Cremers, C, Garratt, L |
---|---|
Format: | Conference item |
Published: |
IEEE
2016
|
Similar Items
-
A formal analysis of the signal messaging protocol
by: Cohn-Gordon, K, et al.
Published: (2017) -
Actor Key Compromise: Consequences and Countermeasures
by: Basin, D, et al.
Published: (2015) -
Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal
by: Cremers, C, et al.
Published: (2013) -
Choreographies with Secure Boxes and Compromised Principals
by: Joshua Guttman, et al.
Published: (2009-12-01) -
On secure messaging
by: Cohn-Gordon, K
Published: (2018)