key compromise
Definition
Basically there are three infrastructures that are included in “key management” systems that must be protected:
- Key pair creation and storage
- Event signing
- Event signature verification So when we say “key compromise” we really mean compromise of one of those three things.
More information
More in the security sections of Universal Identifier Theory