Forward Security Adaptive Cryptography: Time Evolution
Gene Itkis, Boston University
Introduction by Example: Forward Secure Signatures
Threshold Crypto: Space Dimension
Proactive Crypto: Time Evolution of Sharing
Price of Proactive/Threshold Security
Threshold and Forward Security: Overview
Threshold and Proactive Cryptography
Key Evolution: Functional Definitions for Forward Security
Specific Example: Forward Secure Signatures
Forward Secure Pseudorandom Generators
Symmetric Cryptography: From fsPRG to fsMAC, Audit Logs, and Encryption
Forward Secure Public Key Crypto: Naive Generic Construction
Time–Space Trade-off: Pebbling
Forward-Secure Public Key Encryption
Forward Security: Open Problems
Evolving Cryptography: Beyond Forward Security
SECURITY AND SECRET KEYS
As our world is growing increasingly dependent on digital systems, security of these systems is becoming increasingly critical. In addition to accidental failures, threats of malicious attacks must be addressed by the security systems of today and tomorrow.
Connectivity of the digital systems has become an integral part of their functionality. ...
Get Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.