Conference item icon

Conference item

On post-compromise security

Abstract:

In this work we study communication with a party whose secrets have already been compromised. At first sight, it may seem impossible to provide any type of security in this scenario. However, under some conditions, practically relevant guarantees can still be achieved. We call such guarantees “postcompromise security”.


We provide the first informal and formal definitions for post-compromise security, and show that it can be achieved in several scenarios. At a technical level, ...

Expand abstract
Publication status:
Published
Peer review status:
Peer reviewed

Actions


Access Document


Files:
Publisher copy:
10.1109/CSF.2016.19

Authors


More by this author
Institution:
University of Oxford
Division:
MPLS
Department:
Computer Science
Role:
Author
More by this author
Institution:
University of Oxford
Division:
MPLS
Department:
Computer Science
Role:
Author
More by this author
Institution:
University of Oxford
Division:
MPLS
Department:
Computer Science
Role:
Author
Engineering and Physical Sciences Research Council More from this funder
Publisher:
IEEE Publisher's website
Journal:
9th IEEE Computer Security Foundations Symposium Journal website
Host title:
29th IEEE Computer Security Foundations Symposium
Publication date:
2016-06-01
Acceptance date:
2016-04-26
DOI:
ISSN:
2374-8303
Source identifiers:
620543
Keywords:
Pubs id:
pubs:620543
UUID:
uuid:241da365-1c73-4b6a-826c-f122c4c1e1b8
Local pid:
pubs:620543
Deposit date:
2016-05-12

Terms of use


Views and Downloads






If you are the owner of this record, you can report an update to it here: Report update to this record

TO TOP