To obtain access to full text of journal and articles you must register!
- Article name
- A protocol of synchronous key pairs modification for some non-interactive application scenarios
- Authors
- Panasenko S. P., , panasenko@guardant.ru, JSC "Active-soft", Moscow, Russia
- Keywords
- key exposure / key-evolving techniques / forward security / digital signature / key exchange / asymmetric cryptography
- Year
- 2024 Issue 4 Pages 3 - 9
- Code EDN
- ZMEUJB
- Code DOI
- 10.52190/2073-2600_2024_4_3
- Abstract
- This article describes an add-on to algorithms of electronic signature and key exchange, which allows to achieve the property of forward security. The add-on is based on the key evolution protocol, designed for use in systems with the absence of a direct channel for interactive data exchange between users that does not allow using the most of well-known methods of ensuring forward security in such systems, because they actively use the interactive data exchange. The proposed protocol is intended for applications where data exchange between the parties is relatively rare; an example of such applications is the protection of e-mail messages.
- Text
- BUY for read the full text of article
- Buy
- 500.00 rub