{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T22:49:49Z","timestamp":1725922189618},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319710747"},{"type":"electronic","value":"9783319710754"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-71075-4_25","type":"book-chapter","created":{"date-parts":[[2017,11,28]],"date-time":"2017-11-28T12:37:18Z","timestamp":1511872638000},"page":"232-237","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Permanent Reencryption: How to Survive Generations of Cryptanalysts to Come"],"prefix":"10.1007","author":[{"given":"Marcus","family":"V\u00f6lp","sequence":"first","affiliation":[]},{"given":"Francisco","family":"Rocha","sequence":"additional","affiliation":[]},{"given":"Jeremie","family":"Decouchant","sequence":"additional","affiliation":[]},{"given":"Jiangshan","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Paulo","family":"Esteves-Verissimo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,29]]},"reference":[{"key":"25_CR1","unstructured":"Backes, M., Berrang, P., Humbert, M., Shen, X., Wolf, V.: Simulating the large-scale erosion of genomic privacy over time. In: 3rd International Workshop on Genome Privacy and Security (GenoPri) (2016)"},{"key":"25_CR2","doi-asserted-by":"crossref","unstructured":"Cachin, C., Kursawe, K., Lysyanskaya, A., Strobl, R.: Asynchronous verifiable secret sharing and proactive cryptosystems. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, pp. 88\u201397. ACM, New York (2002). http:\/\/doi.acm.org\/10.1145\/586110.586124","DOI":"10.1145\/586110.586124"},{"key":"25_CR3","unstructured":"Desmedt, Y., Jajodia, S.: Redistributing secret shares to new access structures and its applications. Technical report ISSE-TR-97-01, Department of Information and Software Engineering, George Mason University (1997)"},{"key":"25_CR4","doi-asserted-by":"crossref","unstructured":"Gentry, C.: A fully homomorphic encryption scheme. Ph.D. thesis, Stanford, September 2009","DOI":"10.1145\/1536414.1536440"},{"key":"25_CR5","doi-asserted-by":"crossref","unstructured":"Gupta, V.H., Gopinath, K.: G $$^2_{\\rm {its}}$$ VSR: an information theoretical secure verifiable secret redistribution protocol for long-term archival storage. In: International IEEE Security in Storage Workshop, pp. 22\u201333 (2007)","DOI":"10.1109\/SISW.2007.11"},{"issue":"6","key":"25_CR6","doi-asserted-by":"crossref","first-page":"1154","DOI":"10.1101\/gr.135780.111","volume":"22","author":"M Gymrek","year":"2012","unstructured":"Gymrek, M., Golan, D., Rosset, S., Erlich, Y.: lobSTR: a short tandem repeat profiler for personal genomes. Genome Res. 22(6), 1154\u20131162 (2012)","journal-title":"Genome Res."},{"key":"25_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1007\/3-540-44750-4_27","volume-title":"Advances in Cryptology \u2014 CRYPT0\u2019 95","author":"A Herzberg","year":"1995","unstructured":"Herzberg, A., Jarecki, S., Krawczyk, H., Yung, M.: Proactive secret sharing or: how to cope with perpetual leakage. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 339\u2013352. Springer, Heidelberg (1995). https:\/\/doi.org\/10.1007\/3-540-44750-4_27"},{"key":"25_CR8","unstructured":"Power, D.A.: Federal agencies need to address aging legacy systems. Testimony Before the Committee on Oversight and Government Reform, House of Representatives, May 2016. http:\/\/www.gao.gov\/assets\/680\/677454.pdf"},{"issue":"11","key":"25_CR9","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"25_CR10","doi-asserted-by":"crossref","unstructured":"Sousa, P., Neves, N.F., Verissimo, P.: Proactive resilience through architectural hybridization. In: ACM Symposium on Applied Computing, SAC 2006, Dijon, France, April 2006","DOI":"10.1145\/1141277.1141435"},{"key":"25_CR11","doi-asserted-by":"crossref","unstructured":"Wong, T., Wang, C., Wing, J.: Verifiable secret redistribution for archive systems. In: International IEEE Security in Storage Workshop (2002)","DOI":"10.21236\/ADA461227"},{"key":"25_CR12","doi-asserted-by":"crossref","unstructured":"Yu, J., Ryan, M., Chen, L.: Authenticating compromisable storage systems. In: IEEE TrustCom 2017 (2017)","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.216"},{"issue":"3","key":"25_CR13","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1145\/1085126.1085127","volume":"8","author":"L Zhou","year":"2005","unstructured":"Zhou, L., Schneider, F.B., Van Renesse, R.: APSS: proactive secret sharing in asynchronous systems. ACM Trans. Inf. Syst. Secur. 8(3), 259\u2013286 (2005). https:\/\/doi.org\/10.1145\/1085126.1085127","journal-title":"ACM Trans. Inf. Syst. Secur."}],"container-title":["Lecture Notes in Computer Science","Security Protocols XXV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-71075-4_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,6]],"date-time":"2019-10-06T20:42:53Z","timestamp":1570394573000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-71075-4_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319710747","9783319710754"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-71075-4_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}