A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys
[chapter]
2006
Lecture Notes in Computer Science
A security proof in the Bellare-Rogaway model and the random oracle model is provided for a protocol closely based on one originally proposed by Boyd (1996) , which enjoys some remarkable efficiency properties. The model is extended so that it can detect a known weakness of the protocol that cannot be captured in the original model. An alternative protocol, provably secure in the extended model and the random oracle model, offering the same efficiency features as the original protocol is
doi:10.1007/11780656_31
fatcat:66rtpv7pr5dp7h766j5gql7x7a