Conference item
On post-compromise security
- Abstract:
-
In this work we study communication with a party whose secrets have already been compromised. At first sight, it may seem impossible to provide any type of security in this scenario. However, under some conditions, practically relevant guarantees can still be achieved. We call such guarantees “postcompromise security”.
We provide the first informal and formal definitions for post-compromise security, and show that it can be achieved in several scenarios. At a technical level, we instantiate our informal definitions in the setting of authenticated key exchange (AKE) protocols, and develop two new strong security models for two different threat models. We show that both of these security models can be satisfied, by proposing two concrete protocol constructions and proving they are secure in the models. Our work leads to crucial insights on how postcompromise security can (and cannot) be achieved, paving the way for applications in other domains.
- Publication status:
- Published
- Peer review status:
- Peer reviewed
Actions
Access Document
- Files:
-
-
(Preview, Accepted manuscript, pdf, 599.9KB, Terms of use)
-
- Publisher copy:
- 10.1109/CSF.2016.19
Authors
- Publisher:
- IEEE
- Host title:
- 29th IEEE Computer Security Foundations Symposium
- Journal:
- 9th IEEE Computer Security Foundations Symposium More from this journal
- Publication date:
- 2016-06-01
- Acceptance date:
- 2016-04-26
- DOI:
- ISSN:
-
2374-8303
- Keywords:
- Pubs id:
-
pubs:620543
- UUID:
-
uuid:241da365-1c73-4b6a-826c-f122c4c1e1b8
- Local pid:
-
pubs:620543
- Source identifiers:
-
620543
- Deposit date:
-
2016-05-12
Terms of use
- Copyright holder:
- Katriel Cohn-Gordon
- Copyright date:
- 2016
- Notes:
- © 2016, Katriel Cohn-Gordon. Under license to IEEE
If you are the owner of this record, you can report an update to it here: Report update to this record