D 2014-04-20T23:19:04.376 L keyrevokation P 9ea7785a94217005fd0529bb6581e9299b5af312 U bernd W 1811

Key Revocation

Key revocation usually is done with a signature of the lost key, i.e. both the owner and the adversary can revoke a compromised key.  However, the important function in case of a revocation is declaring the successor key, which reestablishs trust. To do that, you must actually proof that you are the legitimate owner of the exposed secret key, so how do you do that?  After all, the adversary has stolen it!

Therefore, the requirements are as follows:

I create two random number s1 and s2.  Using these numbers, I create pubkeys p1=base*(s1) and p2=base*(s2).  I compute (s)=(s1*p2) as "work secret" (i.e. the secret key that is proving my identity), and p=base*(s), my pubkey.  I publish p, p1, and hash(p2), which together are stored as identity.  The assumption is that hash(p2) can't be reversed to get p2, and using p and p1 don't reveal s and s1.
I keep s2 as offline copy (it's just 64 hex digits), and s as protected online copy in my device; s is subject to attacks and backdoors, and therefore at risk.  To revoke a key, I publish p2, which the recipient can validate by p1*(p2)==p, and hash(p2).
To sign a new key, I use s2 as signature key, i.e. the recipient can use the just published p2 to verify the transition to the replacement key.  Of course, the new key also has a signature with s, the old key.
Z 7f8f1392ad1cd7e906a6795240d97aaa