Abstract. For many cryptographic protocols, security relies on the assumption that adversarial entities have lim-ited computational power. This type of security degrades progressively over the lifetime of a protocol. However, some cryptographic services, such as timestamping services or digital archives, are long-lived in nature; they are expected to be secure and operational for a very long time (i.e., super-polynomial). In such cases, security cannot be guaranteed in the traditional sense: a computationally secure protocol may become insecure if the attacker has a super-polynomial number of interactions with the protocol. This paper proposes a new paradigm for the analysis of long-lived security protocols. We allow entities to be active f...
Important properties of many protocols are liveness or availability, i.e., that something good happ...
In this paper we study the protocol insecurity problem for time-dependent security protocols under t...
An increasing amount of information today is generated, exchanged, and stored digitally. This also i...
For many cryptographic protocols, security relies on the assumption that adversarial entities have l...
For many cryptographic protocols, security relies on the assumption that adversarial entities have l...
Huge amounts of information today are stored digitally and a significant amount of this information...
Commonly used digital signature schemes have a limited lifetime because their security is based on c...
Long-term security ensures that a protocol remains secure even in the future, when the adversarial c...
Important properties of many protocols are liveness or availability, i.e., that something good happe...
Time-stamping services produce time-stamp tokens as evidences to prove that digital data existed at ...
Time-stamping services produce time-stamp tokens as evidences to prove that digital data existed at ...
Important properties of many protocols are liveness or availability, i.e., that something good happe...
Recently, there has been much interest in extending models for simulation-based security in such a ...
Abstract. Digital timestamping is a cryptographic technique allowing affixing a reliable date to a d...
Sensitive electronic data may be required to remain confidential for long periods of time. Yet encry...
Important properties of many protocols are liveness or availability, i.e., that something good happ...
In this paper we study the protocol insecurity problem for time-dependent security protocols under t...
An increasing amount of information today is generated, exchanged, and stored digitally. This also i...
For many cryptographic protocols, security relies on the assumption that adversarial entities have l...
For many cryptographic protocols, security relies on the assumption that adversarial entities have l...
Huge amounts of information today are stored digitally and a significant amount of this information...
Commonly used digital signature schemes have a limited lifetime because their security is based on c...
Long-term security ensures that a protocol remains secure even in the future, when the adversarial c...
Important properties of many protocols are liveness or availability, i.e., that something good happe...
Time-stamping services produce time-stamp tokens as evidences to prove that digital data existed at ...
Time-stamping services produce time-stamp tokens as evidences to prove that digital data existed at ...
Important properties of many protocols are liveness or availability, i.e., that something good happe...
Recently, there has been much interest in extending models for simulation-based security in such a ...
Abstract. Digital timestamping is a cryptographic technique allowing affixing a reliable date to a d...
Sensitive electronic data may be required to remain confidential for long periods of time. Yet encry...
Important properties of many protocols are liveness or availability, i.e., that something good happ...
In this paper we study the protocol insecurity problem for time-dependent security protocols under t...
An increasing amount of information today is generated, exchanged, and stored digitally. This also i...