2012
DOI: 10.1007/s10623-012-9747-6
|View full text |Cite
|
Sign up to set email alerts
|

Long term confidentiality: a survey

Abstract: Abstract. Sensitive electronic data may be required to remain confidential for long periods of time. Yet encryption under a computationally secure cryptosystem cannot provide a guarantee of long term confidentiality, due to potential advances in computing power or cryptanalysis. Long term confidentiality is ensured by information theoretically secure ciphers, but at the expense of impractical key agreement and key management. We overview known methods to alleviate these problems, whilst retaining some form of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 24 publications
(11 citation statements)
references
References 95 publications
0
11
0
Order By: Relevance
“…10 It should be noted that it is difficult to obtain an optimal protocol from (6) because the number n, t, and the cardinalities jC 1 j; . .…”
Section: Information Reconciliationmentioning
confidence: 99%
See 3 more Smart Citations
“…10 It should be noted that it is difficult to obtain an optimal protocol from (6) because the number n, t, and the cardinalities jC 1 j; . .…”
Section: Information Reconciliationmentioning
confidence: 99%
“…Then, by using the above discussion, we have SðX; YkZÞ ! maxfIðX; YÞ À IðX; ZÞ; IðY; XÞ À IðY; ZÞ; 0g (10) obtained in [1], [15], and [31]. This implies that a secret-key agreement is possible with a positive generation rate when either IðX; YÞ > IðX; ZÞ or IðY; XÞ > IðY; ZÞ is satisfied.…”
Section: F Combination Of Information Reconciliation and Privacy Ampmentioning
confidence: 99%
See 2 more Smart Citations
“…In recent years, cryptographers have been making efforts in the area of post-quantum computational cryptography [1][2][3][4][5][6]. They have also begun to construct alternative post-quantum (i.e., quantum-resistant) public key cryptosystems from other mathematically intractable problems [7][8][9][10][11][12][13].…”
Section: Introductionmentioning
confidence: 99%