Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques

@inproceedings{Abdalla2000IncreasingTL,
  title={Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques},
  author={Michel Abdalla and M. Bellare},
  booktitle={ASIACRYPT},
  year={2000}
}
Rather than use a shared key directly to cryptographically process (e.g. encrypt or authenticate) data one can use it as a master key to derive subkeys, and use the subkeys for the actual cryptographic processing. This popular paradigm is called re-keying, and the expectation is that it is good for security. In this paper we provide concrete security analyses of various re-keying mechanisms and their usage. We show that re-keying does indeed "increase" security, effectively extending the… Expand
Increasing the Lifetime of Symmetric Keys for the GCM Mode by Internal Re-keying
RCB: leakage-resilient authenticated encryption via re-keying
On Internal Re-keying
On Making U2F Protocol Leakage-Resilient via Re-keying
A Formal Treatment of Multi-key Channels
Provably secure counter mode with related-key-based internal re-keying
Secure Key-Updating for Lazy Revocation
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 49 REFERENCES
An Identity-Based Key-Exchange Protocol
Advances in Cryptology — CRYPTO ’96
  • N. Koblitz
  • Computer Science
  • Lecture Notes in Computer Science
  • 2001
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm
A concrete security treatment of symmetric encryption
A Forward-Secure Digital Signature Scheme
Advances in Cryptology — CRYPTO’ 92
  • E. Brickell
  • Computer Science
  • Lecture Notes in Computer Science
  • 2001
...
1
2
3
4
5
...