2013
DOI: 10.1007/978-3-642-45239-0_16
|View full text |Cite
|
Sign up to set email alerts
|

Secure Key Management in the Cloud

Abstract: Abstract. We consider applications involving a number of servers in the cloud that go through a sequence of online periods where the servers communicate, separated by offline periods where the servers are idle. During the offline periods, we assume that the servers need to securely store sensitive information such as cryptographic keys. Applications like this include many cases where secure multiparty computation is outsourced to the cloud, and in particular a number of online auctions and benchmark computatio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0
2

Year Published

2013
2013
2022
2022

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 23 publications
(16 citation statements)
references
References 36 publications
0
14
0
2
Order By: Relevance
“…Public verification for key can also be done using [3] Robert secretsharing scheme where knowing both global keys and (n−1) shares would not retrieve us the plain text that was being shared. In RSA algorithm [10], each piece of key is in parts such that it cannot be computed without the secret or private key owned with the owner itself, and the encryption cannot be executed if its exceeds the threshold value (t).…”
Section: Vedika and Quadirmentioning
confidence: 99%
“…Public verification for key can also be done using [3] Robert secretsharing scheme where knowing both global keys and (n−1) shares would not retrieve us the plain text that was being shared. In RSA algorithm [10], each piece of key is in parts such that it cannot be computed without the secret or private key owned with the owner itself, and the encryption cannot be executed if its exceeds the threshold value (t).…”
Section: Vedika and Quadirmentioning
confidence: 99%
“…In this section describing the solutions that have been proposed in [6], authors have considered that the applications involving a number of servers in the cloud that go through a sequence of online periods where the servers communicate, separated by offline periods where the servers are idle. During the offline periods, servers need to securely store sensitive information such as cryptographic keys.…”
Section: Survey Of Existing Key Management Frame Work For Cloud Commentioning
confidence: 99%
“…Optimal confidentiality and better availability hence achieved by using a sharing scheme with full threshold (t = n -1 ), such as additive sharing's over a finite field. This ensures optimal confidentiality of the secret files against offline attacks [6].…”
Section: Comparison Study Of Existing Workmentioning
confidence: 99%
See 1 more Smart Citation
“…This helps to sustain data confidentiality. The user who holds decryption key [2][3] is acknowledged to get access to encrypted data. There are few claiming pertained to this type of access control mechanism.…”
Section: Introductionmentioning
confidence: 99%