A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2011; you can also visit the original URL.
The file type is application/pdf
.
Two Types of Key-Compromise Impersonation Attacks against One-Pass Key Establishment Protocols
[chapter]
2008
Communications in Computer and Information Science
Key establishment protocols are among the most important security mechanisms via which two or more parties can encrypt their communications over an insecure network. This paper is concerned with the vulnerability of onepass two-party key establishment protocols to key-compromise impersonation (K-CI) attacks. The latter may occur once an adversary has obtained the longterm private key of an honest party, and represent a serious -but often underestimated -threat, because a successful
doi:10.1007/978-3-540-88653-2_17
fatcat:svyaolsndzhg5i3urusu5qirqq