{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T09:22:57Z","timestamp":1725700977451},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642323430"},{"type":"electronic","value":"9783642323447"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-32344-7_2","type":"book-chapter","created":{"date-parts":[[2012,8,18]],"date-time":"2012-08-18T09:48:14Z","timestamp":1345283294000},"page":"13-24","source":"Crossref","is-referenced-by-count":3,"title":["Recoverable Encryption through Noised Secret over a Large Cloud"],"prefix":"10.1007","author":[{"given":"Sushil","family":"Jajodia","sequence":"first","affiliation":[]},{"given":"Witold","family":"Litwin","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Schwarz","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"Abelson, H., Anderson, R., Bellovin, S.M., Benaloh, J., Blaze, M., Gilmore, J., Neumann, P.G., Rivest, R.L., Schneier, B.: The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption, http:\/\/www.crypto.com\/papers\/escrowrisks98.pdf"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Abiteboul, S., Manolescu, I., Rigaux, P., Rousset, M.C., Senellart, P.: Web Data Management. Cambridge University Press (2011)","DOI":"10.1017\/CBO9780511998225"},{"key":"2_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/3-540-61996-8_50","volume-title":"Information Hiding","author":"M. Blaze","year":"1996","unstructured":"Blaze, M.: Oblivious Key Escrow. In: Anderson, R. (ed.) IH 1996. LNCS, vol.\u00a01174, pp. 335\u2013343. Springer, Heidelberg (1996)"},{"key":"2_CR4","unstructured":"Crypto++ 5.6.0 Benchmarks, http:\/\/www.cryptopp.com\/benchmarks.html"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Bellare, M., Goldwasser, S.: Verifiable partial key escrow. In: 4th ACM CCS Conf., pp. 78\u201391 (1997)","DOI":"10.1145\/266420.266439"},{"key":"2_CR6","unstructured":"Chandrasekhar, S.: Construction of Efficient Authentication Schemes Using Trapdoor Hash Functions. Ph.D Dissertation. University of Kentucky (2011)"},{"key":"2_CR7","unstructured":"CloudLayer Hourly Pricing, http:\/\/www.softlayer.com\/cloudlayer\/computing\/"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Denning, D.E., Branstad, D.K.: A Taxonomy for key escrow encryption systems. Communications of the ACM\u00a039(3) (1966)","DOI":"10.1145\/227234.227239"},{"key":"2_CR9","unstructured":"Denning, D.E., Branstad, D.K.: A Taxonomy for Key Recovery Encryption Systems, http:\/\/faculty.nps.edu\/dedennin\/publications\/TaxonomyKeyRecovery.htm"},{"key":"2_CR10","unstructured":"Lee, R.D.: Testimony of Ronald D. Lee, Attorney General.... (March 1999), http:\/\/www.cybercrime.gov\/leesti.htm"},{"key":"2_CR11","unstructured":"Miller, E., Long, D., Freeman, W., Reed, B.: Strong security for distributed file systems. In: Proceedings of the Conference on File and Storage Technologies (FAST 2002), pp. 1\u201313 (January 2002)"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Jajodia, S., Litwin, W., Schwarz, T.: LH*R E: A Scalable Distributed Data Structure with Recoverable Encryption. In: IEEE-CLOUD 2010 (2010)","DOI":"10.1109\/CLOUD.2010.41"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Jajodia, S., Litwin, W., Schwarz, T.: Privacy of Data Outsourced to a Cloud for Selected Readers through Client-Side Encryption. In: CCS 2011 Workshop on Privacy in the Electronic Society (WPES 2011), Chicago (2011)","DOI":"10.1145\/2046556.2046580"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Jajodia, S., Litwin, W., Schwarz, T.: Recoverable Encryption Through Noised Secret. Electronic Res. Rep. (2011), http:\/\/www.lamsade.dauphine.fr\/~litwin\/Recoverable%20Encryption_10.pdf","DOI":"10.1007\/978-3-642-32344-7_2"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Litwin, W., Neimat, M.-A., Schneider, D.: LH* - A Scalable Distributed Data Structure. ACM TODS 12 (1996)","DOI":"10.1145\/236711.236713"},{"key":"2_CR16","unstructured":"Rivest, R.L., Shamir, A., Wagner, D.A.: Time-lock puzzles and timed-release crypto. Technical Report, Massachusetts Institute of Technology, MIT\/LCS\/TR-684 (1996)"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Walker, S., Lipner, S., Ellison, C., Balenson, D.: Commercial key recovery. Communications of the ACM\u00a039 (March 3, 1996)","DOI":"10.1145\/227234.227240"}],"container-title":["Lecture Notes in Computer Science","Data Management in Cloud, Grid and P2P Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-32344-7_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,25]],"date-time":"2023-06-25T10:29:36Z","timestamp":1687688976000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-32344-7_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642323430","9783642323447"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-32344-7_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}