{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T02:52:35Z","timestamp":1725763955629},"publisher-location":"Berlin, Heidelberg","reference-count":42,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642452383"},{"type":"electronic","value":"9783642452390"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-45239-0_16","type":"book-chapter","created":{"date-parts":[[2013,12,11]],"date-time":"2013-12-11T08:20:44Z","timestamp":1386750044000},"page":"270-289","source":"Crossref","is-referenced-by-count":12,"title":["Secure Key Management in the Cloud"],"prefix":"10.1007","author":[{"given":"Ivan","family":"Damg\u00e5rd","sequence":"first","affiliation":[]},{"given":"Thomas P.","family":"Jakobsen","sequence":"additional","affiliation":[]},{"given":"Jesper Buus","family":"Nielsen","sequence":"additional","affiliation":[]},{"given":"Jakob I.","family":"Pagter","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"593","DOI":"10.1007\/11761679_35","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"J.F. Almansa","year":"2006","unstructured":"Almansa, J.F., Damg\u00e5rd, I., Nielsen, J.B.: Simplified threshold RSA with adaptive and proactive security. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol.\u00a04004, pp. 593\u2013611. Springer, Heidelberg (2006)"},{"key":"16_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"576","DOI":"10.1007\/3-540-45022-X_49","volume-title":"Automata, Languages and Programming","author":"N. Alon","year":"2000","unstructured":"Alon, N., Kaplan, H., Krivelevich, M., Malkhi, D., Stern, J.P.: Scalable secure storage when half the system is faulty. In: Welzl, E., Montanari, U., Rolim, J.D.P. (eds.) ICALP 2000. LNCS, vol.\u00a01853, pp. 576\u2013587. Springer, Heidelberg (2000)"},{"key":"16_CR3","first-page":"313","volume":"48","author":"G.R. Blakely","year":"1979","unstructured":"Blakely, G.R.: Safeguarding cryptographic keys. National Computer Conference Proceedings A.F.I.P.S\u00a048, 313\u2013317 (1979)","journal-title":"National Computer Conference Proceedings A.F.I.P.S"},{"key":"16_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/978-3-642-03549-4_20","volume-title":"Financial Cryptography and Data Security","author":"P. Bogetoft","year":"2009","unstructured":"Bogetoft, P., et al.: Secure multiparty computation goes live. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol.\u00a05628, pp. 325\u2013343. Springer, Heidelberg (2009)"},{"doi-asserted-by":"crossref","unstructured":"Brakerski, Z., Gentry, C., Vaikuntanathan, V. (Leveled) fully homomorphic encryption without bootstrapping. In: Goldwasser, S. (ed.) ITCS, pp. 309\u2013325. ACM (2012)","key":"16_CR5","DOI":"10.1145\/2090236.2090262"},{"doi-asserted-by":"crossref","unstructured":"Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: FOCS, pp. 136\u2013145. IEEE Computer Society (2001)","key":"16_CR6","DOI":"10.1109\/SFCS.2001.959888"},{"key":"16_CR7","first-page":"1","volume":"3","author":"R. Canetti","year":"1997","unstructured":"Canetti, R., Gennaro, R., Herzberg, A.: Proactive security: Long-term protection against break-ins. Crypto Bytes\u00a03, 1\u20138 (1997)","journal-title":"Crypto Bytes"},{"issue":"1","key":"16_CR8","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/s001459910004","volume":"13","author":"R. Canetti","year":"2000","unstructured":"Canetti, R., Halevi, S., Herzberg, A.: Maintaining authenticated communication in the presence of break-ins. J. Cryptology\u00a013(1), 61\u2013105 (2000)","journal-title":"J. Cryptology"},{"key":"16_CR9","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.ic.2013.03.003","volume":"226","author":"R. Canetti","year":"2013","unstructured":"Canetti, R., Riva, B., Rothblum, G.N.: Refereed delegation of computation. Inf. Comput.\u00a0226, 16\u201336 (2013)","journal-title":"Inf. Comput."},{"doi-asserted-by":"crossref","unstructured":"Chung, K.-M., Kalai, Y.T., Vadhan, S.P.: Improved delegation of computation using fully homomorphic encryption. In: Rabin (ed.) [35], pp. 483\u2013501","key":"16_CR10","DOI":"10.1007\/978-3-642-14623-7_26"},{"doi-asserted-by":"crossref","unstructured":"Damg\u00e5rd, I., Jakobsen, T.P., Nielsen, J.B., Pagter, J.I.: Secure key management in the cloud. Cryptology ePrint Archive, Report 2013\/626 (2013), \n                    \n                      http:\/\/eprint.iacr.org\/","key":"16_CR11","DOI":"10.1007\/978-3-642-45239-0_16"},{"doi-asserted-by":"crossref","unstructured":"Damg\u00e5rd, I., Pastro, V., Smart, N.P., Zakarias, S.: Multiparty computation from somewhat homomorphic encryption. In: Safavi-Naini, Canetti (eds.) [37], pp. 643\u2013662","key":"16_CR12","DOI":"10.1007\/978-3-642-32009-5_38"},{"issue":"6","key":"16_CR13","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory\u00a022(6), 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"2","key":"16_CR14","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/BF00124891","volume":"2","author":"W. Diffie","year":"1992","unstructured":"Diffie, W., van Oorschot, P.C., Wiener, M.J.: Authentication and authenticated key exchanges. Des. Codes Cryptography\u00a02(2), 107\u2013125 (1992)","journal-title":"Des. Codes Cryptography"},{"unstructured":"Amazon EC2 instance types, \n                    \n                      http:\/\/aws.amazon.com\/ec2\/instance-types","key":"16_CR15"},{"unstructured":"The Encrypting File System (EFS). A white paper from Microsoft Corporation, \n                    \n                      http:\/\/technet.microsoft.com\/en-us\/library\/cc700811.aspx","key":"16_CR16"},{"unstructured":"Danish Energy Auctions, \n                    \n                      http:\/\/energiauktion.dk","key":"16_CR17"},{"issue":"1","key":"16_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/505452.505453","volume":"20","author":"K. Fu","year":"2002","unstructured":"Fu, K., Frans Kaashoek, M., Mazi\u00e8res, D.: Fast and secure distributed read-only file system. ACM Trans. Comput. Syst.\u00a020(1), 1\u201324 (2002)","journal-title":"ACM Trans. Comput. Syst."},{"issue":"1-2","key":"16_CR19","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1016\/S0304-3975(98)00263-1","volume":"243","author":"J.A. Garay","year":"2000","unstructured":"Garay, J.A., Gennaro, R., Jutla, C.S., Rabin, T.: Secure distributed storage and retrieval. Theor. Comput. Sci.\u00a0243(1-2), 363\u2013389 (2000)","journal-title":"Theor. Comput. Sci."},{"doi-asserted-by":"crossref","unstructured":"Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In: Rabin (ed.) [35], pp. 465\u2013482","key":"16_CR20","DOI":"10.1007\/978-3-642-14623-7_25"},{"key":"16_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1007\/978-3-642-10433-6_32","volume-title":"Cryptology and Network Security","author":"C. Gentry","year":"2009","unstructured":"Gentry, C.: Computing on encrypted data. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol.\u00a05888, pp. 477\u2013477. Springer, Heidelberg (2009)"},{"doi-asserted-by":"crossref","unstructured":"Gentry, C.: A fully homomorphic encryption scheme. PhD thesis, Stanford University (2009), \n                    \n                      http:\/\/crypto.stanford.edu\/craig","key":"16_CR22","DOI":"10.1145\/1536414.1536440"},{"doi-asserted-by":"crossref","unstructured":"Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game or a completeness theorem for protocols with honest majority. In: Aho, A.V. (ed.) STOC, pp. 218\u2013229. ACM (1987)","key":"16_CR23","DOI":"10.1145\/28395.28420"},{"unstructured":"HELib, a software library implementing fully homomorphic encryption (copyrighted by IBM) (2012), \n                    \n                      https:\/\/github.com\/shaih\/HElib","key":"16_CR24"},{"key":"16_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1007\/3-540-44750-4_27","volume-title":"Advances in Cryptology - CRYPTO \u201995","author":"A. Herzberg","year":"1995","unstructured":"Herzberg, A., Jarecki, S., Krawczyk, H., Yung, M.: Proactive secret sharing or: How to cope with perpetual leakage. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol.\u00a0963, pp. 339\u2013352. Springer, Heidelberg (1995)"},{"unstructured":"Howard, J.H.: An overview of the Andrew File System. In: Winter 1988 USENIX Conference Proceedings, pp. 23\u201326 (1988)","key":"16_CR26"},{"unstructured":"Kamara, S., Mohassel, P., Raykova, M.: Outsourcing multi-party computation. IACR Cryptology ePrint Archive, 2011:272 (2011)","key":"16_CR27"},{"doi-asserted-by":"crossref","unstructured":"Kher, V., Kim, Y.: Securing distributed storage: Challenges, techniques, and systems. In: Atluri, V., Samarati, P., Yurcik, W., Brumbaugh, L., Zhou, Y. (eds.) StorageSS, pp. 9\u201325. ACM (2005)","key":"16_CR28","DOI":"10.1145\/1103780.1103783"},{"doi-asserted-by":"crossref","unstructured":"Krawczyk, H.: Distributed fingerprints and secure information dispersal. In: Anderson, J., Toueg, S. (eds.) PODC, pp. 207\u2013218. ACM (1993)","key":"16_CR29","DOI":"10.1145\/164051.164075"},{"key":"16_CR30","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1109\/ICDCS.2003.1203461","volume-title":"Proceedings of the 23rd International Conference on Distributed Computing Systems, ICDCS 2003","author":"S. Lakshmanan","year":"2003","unstructured":"Lakshmanan, S., Ahamad, M., Venkateswaran, H.: Responsive security for stored data. In: Proceedings of the 23rd International Conference on Distributed Computing Systems, ICDCS 2003, p. 146. IEEE Computer Society, Washington, DC (2003)"},{"key":"16_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-34704-7_1","volume-title":"Information Security and Cryptology","author":"B. Libert","year":"2012","unstructured":"Libert, B., Yung, M.: Adaptively secure forward-secure non-interactive threshold cryptosystems. In: Wu, C.-K., Yung, M., Lin, D. (eds.) Inscrypt 2011. LNCS, vol.\u00a07537, pp. 1\u201321. Springer, Heidelberg (2012)"},{"doi-asserted-by":"crossref","unstructured":"Nielsen, J.B., Nordholt, P.S., Orlandi, C., Burra, S.S.: A new approach to practical active-secure two-party computation. In: Safavi-Naini, Canetti [37], pp. 681\u2013700","key":"16_CR32","DOI":"10.1007\/978-3-642-32009-5_40"},{"unstructured":"Partisia, \n                    \n                      http:\/\/partisia.com","key":"16_CR33"},{"issue":"2","key":"16_CR34","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1145\/62044.62050","volume":"36","author":"M.O. Rabin","year":"1989","unstructured":"Rabin, M.O.: Efficient dispersal of information for security, load balancing, and fault tolerance. J. ACM\u00a036(2), 335\u2013348 (1989)","journal-title":"J. ACM"},{"key":"16_CR35","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology \u2013 CRYPTO 2010","year":"2010","unstructured":"Rabin, T. (ed.): CRYPTO 2010. LNCS, vol.\u00a06223. Springer, Heidelberg (2010)"},{"unstructured":"Rasmussen, T.: Key Management in the Cloud. Master\u2019s thesis, Aarhus University, Aabogade 34, DK-8200 Aarhus N, Denmark. Master\u2019s Thesis (2012)","key":"16_CR36"},{"key":"16_CR37","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology \u2013 CRYPTO 2012","year":"2012","unstructured":"Safavi-Naini, R., Canetti, R. (eds.): CRYPTO 2012. LNCS, vol.\u00a07417. Springer, Heidelberg (2012)"},{"issue":"11","key":"16_CR38","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM\u00a022(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"unstructured":"ShareMind, \n                    \n                      http:\/\/sharemind.cyber.ee","key":"16_CR39"},{"unstructured":"Spencer, B.P., Noveck, D., Robinson, D., Thurlow, R.: The NFS version 4 protocol. In: Proceedings of the 2nd International System Administration and Networking Conference, SANE (2000)","key":"16_CR40"},{"unstructured":"Wright, C.P., Martino, M.C., Zadok, E.: NCryptfs: A secure and convenient cryptographic file system. In: Proceedings of the Annual USENIX Technical Conference, pp. 197\u2013210. USENIX Association (2003)","key":"16_CR41"},{"doi-asserted-by":"crossref","unstructured":"Yao, A.C.-C.: How to generate and exchange secrets (extended abstract). In: FOCS, pp. 162\u2013167. IEEE Computer Society (1986)","key":"16_CR42","DOI":"10.1109\/SFCS.1986.25"}],"container-title":["Lecture Notes in Computer Science","Cryptography and Coding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-45239-0_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,25]],"date-time":"2019-05-25T11:49:30Z","timestamp":1558784970000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-45239-0_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642452383","9783642452390"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-45239-0_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}