2020
DOI: 10.1093/comjnl/bxaa104
|View full text |Cite
|
Sign up to set email alerts
|

A Modern View on Forward Security

Abstract: Forward security ensures that compromise of entities today does not impact the security of cryptographic primitives employed in the past. Such a form of security is regarded as increasingly important in the modern world due to the existence of adversaries with mass storage capabilities and powerful infiltration abilities. Although the idea of forward security has been known for over 30 years, current understanding of what it really should mean is limited due to the prevalence of new techniques and inconsistent… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
20
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
3
1

Relationship

4
5

Authors

Journals

citations
Cited by 26 publications
(20 citation statements)
references
References 20 publications
0
20
0
Order By: Relevance
“…Therefore, the Signal protocol also includes a semi-static key in user pre-key bundles, and always includes key derivations based on that semi-static key. If the Signal server runs out of ephemeral pre-keys, the corresponding key share is not derived and left out; in that case the semi-static key share still provides delayed forward secrecy [14]. We capture this similarly in SPQR by encapsulating a key-ciphertext pair (đŸ 3 , 𝑐 3 ) against Bob's ephemeral KEM public key 𝑒𝑝𝑘 đ” only if the latter is present.…”
Section: Initiator Registrationmentioning
confidence: 99%
“…Therefore, the Signal protocol also includes a semi-static key in user pre-key bundles, and always includes key derivations based on that semi-static key. If the Signal server runs out of ephemeral pre-keys, the corresponding key share is not derived and left out; in that case the semi-static key share still provides delayed forward secrecy [14]. We capture this similarly in SPQR by encapsulating a key-ciphertext pair (đŸ 3 , 𝑐 3 ) against Bob's ephemeral KEM public key 𝑒𝑝𝑘 đ” only if the latter is present.…”
Section: Initiator Registrationmentioning
confidence: 99%
“…For a more general treatment of the notion of "forward security" and "forward secrecy" in non-interactive contexts (such as 0-RTT protocols or instant messaging), we refer to a work by Boyd and Gellert [13].…”
Section: Session Ticketsmentioning
confidence: 99%
“…As the time-based constructions were inspired by forwardsecure encryption, the qualifier "forward-secure" was added to the primitive's name. For a detailed discussion on the meaning of forward secrecy in non-interactive settings such as 0-RTT, we refer to a recent work by Gellert and Boyd [14].…”
Section: Introductionmentioning
confidence: 99%