A comprehensive survey of cryptography key management systems

S Rana, FK Parast, B Kelly, Y Wang, KB Kent - Journal of Information …, 2023 - Elsevier
Cryptographic methods have been extensively employed in various systems to address
security objectives, such as data confidentiality, authentication, and secure communication …

Fast and secure updatable encryption

C Boyd, GT Davies, K Gjøsteen, Y Jiang - Annual International Cryptology …, 2020 - Springer
Updatable encryption allows a client to outsource ciphertexts to some untrusted server and
periodically rotate the encryption key. The server can update ciphertexts from an old key to a …

Blockchain-based data sharing with key update for future networks

L Xue, D Liu, C Huang, X Shen… - IEEE Journal on …, 2022 - ieeexplore.ieee.org
Future networks incorporate artificial intelligence to enable smart resource management and
adaptive service provisioning. With a heterogeneous architecture and a large number of …

The direction of updatable encryption does matter

R Nishimaki - IACR International Conference on Public-Key …, 2022 - Springer
We introduce a new definition for key updates, called backward-leak uni-directional key
updates, in updatable encryption (UE). This notion is a variant of uni-directional key updates …

The direction of updatable encryption does not matter much

Y Jiang - Advances in Cryptology–ASIACRYPT 2020: 26th …, 2020 - Springer
Updatable encryption schemes allow for key rotation on ciphertexts. A client outsourcing
storage of encrypted data to a cloud server can change its encryption key. The cloud server …

(R) CCA secure updatable encryption with integrity protection

M Klooß, A Lehmann, A Rupp - … on the Theory and Applications of …, 2019 - Springer
An updatable encryption scheme allows a data host to update ciphertexts of a client from an
old to a new key, given so-called update tokens from the client. Rotation of the encryption …

Improving speed and security in updatable encryption schemes

D Boneh, S Eskandarian, S Kim, M Shih - … on the Theory and Application of …, 2020 - Springer
Periodic key rotation is a common practice designed to limit the long-term power of
cryptographic keys. Key rotation refers to the process of re-encrypting encrypted content …

Raziel: Private and verifiable smart contracts on blockchains

DC Sánchez - arXiv preprint arXiv:1807.09484, 2018 - arxiv.org
Raziel combines secure multi-party computation and proof-carrying code to provide privacy,
correctness and verifiability guarantees for smart contracts on blockchains. Effectively …

Updatable public key encryption in the standard model

Y Dodis, H Karthikeyan, D Wichs - … 2021, Raleigh, NC, USA, November 8 …, 2021 - Springer
Forward security (FS) ensures that corrupting the current secret key in the system preserves
the privacy or integrity of the prior usages of the system. Achieving forward security is …

Updatable oblivious key management for storage systems

S Jarecki, H Krawczyk, J Resch - Proceedings of the 2019 ACM SIGSAC …, 2019 - dl.acm.org
We introduce Oblivious Key Management Systems (KMS) as a much more secure
alternative to traditional wrapping-based KMS that form the backbone of key management in …