A comprehensive survey of cryptography key management systems
Cryptographic methods have been extensively employed in various systems to address
security objectives, such as data confidentiality, authentication, and secure communication …
security objectives, such as data confidentiality, authentication, and secure communication …
Fast and secure updatable encryption
Updatable encryption allows a client to outsource ciphertexts to some untrusted server and
periodically rotate the encryption key. The server can update ciphertexts from an old key to a …
periodically rotate the encryption key. The server can update ciphertexts from an old key to a …
Blockchain-based data sharing with key update for future networks
Future networks incorporate artificial intelligence to enable smart resource management and
adaptive service provisioning. With a heterogeneous architecture and a large number of …
adaptive service provisioning. With a heterogeneous architecture and a large number of …
The direction of updatable encryption does matter
R Nishimaki - IACR International Conference on Public-Key …, 2022 - Springer
We introduce a new definition for key updates, called backward-leak uni-directional key
updates, in updatable encryption (UE). This notion is a variant of uni-directional key updates …
updates, in updatable encryption (UE). This notion is a variant of uni-directional key updates …
The direction of updatable encryption does not matter much
Y Jiang - Advances in Cryptology–ASIACRYPT 2020: 26th …, 2020 - Springer
Updatable encryption schemes allow for key rotation on ciphertexts. A client outsourcing
storage of encrypted data to a cloud server can change its encryption key. The cloud server …
storage of encrypted data to a cloud server can change its encryption key. The cloud server …
(R) CCA secure updatable encryption with integrity protection
An updatable encryption scheme allows a data host to update ciphertexts of a client from an
old to a new key, given so-called update tokens from the client. Rotation of the encryption …
old to a new key, given so-called update tokens from the client. Rotation of the encryption …
Improving speed and security in updatable encryption schemes
D Boneh, S Eskandarian, S Kim, M Shih - … on the Theory and Application of …, 2020 - Springer
Periodic key rotation is a common practice designed to limit the long-term power of
cryptographic keys. Key rotation refers to the process of re-encrypting encrypted content …
cryptographic keys. Key rotation refers to the process of re-encrypting encrypted content …
Raziel: Private and verifiable smart contracts on blockchains
DC Sánchez - arXiv preprint arXiv:1807.09484, 2018 - arxiv.org
Raziel combines secure multi-party computation and proof-carrying code to provide privacy,
correctness and verifiability guarantees for smart contracts on blockchains. Effectively …
correctness and verifiability guarantees for smart contracts on blockchains. Effectively …
Updatable public key encryption in the standard model
Forward security (FS) ensures that corrupting the current secret key in the system preserves
the privacy or integrity of the prior usages of the system. Achieving forward security is …
the privacy or integrity of the prior usages of the system. Achieving forward security is …
Updatable oblivious key management for storage systems
We introduce Oblivious Key Management Systems (KMS) as a much more secure
alternative to traditional wrapping-based KMS that form the backbone of key management in …
alternative to traditional wrapping-based KMS that form the backbone of key management in …