Forward-Security in Private-Key Cryptography

@inproceedings{Bellare2001ForwardSecurityIP,
  title={Forward-Security in Private-Key Cryptography},
  author={Mihir Bellare and Bennet S. Yee},
  booktitle={IACR Cryptology ePrint Archive},
  year={2001}
}
This paper provides a comprehensive treatment of forward-security in the context of sharedkey based cryptographic primitives, as a practical means to mitigate the damage caused by key-exposure. We provide definitions of security, practical proven-secure constructions, and applications for the main primitives in this area. We identify forward-secure pseudorandom bit generators as the central primitive, providing several constructions and then showing how forward-secure message authentication… CONTINUE READING
BETA

Figures and Topics from this paper.

Citations

Publications citing this paper.
SHOWING 1-10 OF 202 CITATIONS, ESTIMATED 26% COVERAGE

Practical Secure Logging: Seekable Sequential Key Generators

  • IACR Cryptology ePrint Archive
  • 2013
VIEW 11 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Even more practical secure logging: Tree-based Seekable Sequential Key Generators

  • IACR Cryptology ePrint Archive
  • 2014
VIEW 10 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Non-Interactive Key Exchange and Key Assignment Schemes

VIEW 6 EXCERPTS
CITES METHODS, BACKGROUND & RESULTS
HIGHLY INFLUENCED

Financial Cryptography and Data Security

  • Lecture Notes in Computer Science
  • 2012
VIEW 10 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes

  • IACR Cryptology ePrint Archive
  • 2012
VIEW 6 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Efficient and Low-Cost RFID Authentication Schemes

VIEW 7 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Leakage Resilient Cryptography in Practice

  • Towards Hardware-Intrinsic Security
  • 2009
VIEW 14 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

FILTER CITATIONS BY YEAR

2000
2019

CITATION STATISTICS

  • 28 Highly Influenced Citations

  • Averaged 13 Citations per year over the last 3 years

  • 3% Increase in citations per year in 2018 over 2017

References

Publications referenced by this paper.
SHOWING 1-10 OF 25 REFERENCES

Cryptographic Support for Secure Logs on Untrusted Machines

  • USENIX Security Symposium
  • 1998
VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL

Forward-security in private-key cryptography

M. Bellare, B. Yee
  • Preliminary version of this paper, in Topics in Cryptology – CT-RSA ’03, Lecture Notes in Computer Science Vol. ?? , M. Joye ed., Springer-Verlag, 2003.
  • 2003

Similar Papers

Loading similar papers…