{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:49:36Z","timestamp":1750308576885,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T00:00:00Z","timestamp":1601856000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,5]]},"DOI":"10.1145\/3320269.3372198","type":"proceedings-article","created":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T16:33:23Z","timestamp":1601915603000},"page":"165-177","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Revisiting Shared Data Protection Against Key Exposure"],"prefix":"10.1145","author":[{"given":"Katarzyna","family":"Kapusta","sequence":"first","affiliation":[{"name":"LTCI, T\u00e9l\u00e9com Paris, Institut Polytechnique de Paris, Paris, France"}]},{"given":"Matthieu","family":"Rambaud","sequence":"additional","affiliation":[{"name":"LTCI, T\u00e9l\u00e9com Paris, Institut Polytechnique de Paris, Paris, France"}]},{"given":"Gerard","family":"Memmi","sequence":"additional","affiliation":[{"name":"LTCI, T\u00e9l\u00e9com Paris, Institut Polytechnique de Paris, Paris, France"}]}],"member":"320","published-online":{"date-parts":[[2020,10,5]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Recommendation for Key Management. NIST Special Publication 800--57, Part 1","author":"Barker Elaine","year":"2016","unstructured":"Elaine Barker . 2016. Recommendation for Key Management. NIST Special Publication 800--57, Part 1 , Vol. rev 4 ( 2016 ), 1--147. http:\/\/dx.doi.org\/10.6028\/NIST.SP.800--57pt1r4 10.6028\/NIST.SP.800--57pt1r4 Elaine Barker. 2016. Recommendation for Key Management. NIST Special Publication 800--57, Part 1, Vol. rev 4 (2016), 1--147. http:\/\/dx.doi.org\/10.6028\/NIST.SP.800--57pt1r4"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78967-3_11"},{"volume-title":"Selected Areas in Cryptography","author":"Bertoni Guido","key":"e_1_3_2_1_3_1","unstructured":"Guido Bertoni , Joan Daemen , Micha\u00ebl Peeters , and Gilles Van Assche . 2012. Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications . In Selected Areas in Cryptography , Ali Miri and Serge Vaudenay (Eds.). Springer Berlin Heidelberg , Berlin ,Heidelberg, 320--337. Guido Bertoni, Joan Daemen, Micha\u00ebl Peeters, and Gilles Van Assche. 2012. Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications. In Selected Areas in Cryptography, Ali Miri and Serge Vaudenay (Eds.). Springer Berlin Heidelberg, Berlin,Heidelberg, 320--337."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535929"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/646767.704310"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MARK.1979.8817296"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/646764.703962"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243756"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_26"},{"key":"e_1_3_2_1_10_1","volume-title":"Ivan Bjerre Damg\u00e5rd, and Jesper Buus Nielsen","author":"Cramer Ronald","year":"2015","unstructured":"Ronald Cramer , Ivan Bjerre Damg\u00e5rd, and Jesper Buus Nielsen . 2015 . Secure Multiparty Computation and Secret Sharing .Cambridge University Press . https:\/\/doi.org\/10.1017\/CBO9781107337756 10.1017\/CBO9781107337756 Ronald Cramer, Ivan Bjerre Damg\u00e5rd, and Jesper Buus Nielsen. 2015. Secure Multiparty Computation and Secret Sharing .Cambridge University Press. https:\/\/doi.org\/10.1017\/CBO9781107337756"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993636.1993650"},{"volume-title":"The 17th IEEE Int. Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-18)","author":"Kapusta K.","key":"e_1_3_2_1_13_1","unstructured":"K. Kapusta and G. Memmi . 2018. Enhancing data protection with a structure-wise fragmentation and dispersal of encrypted data . In The 17th IEEE Int. Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-18) . K. Kapusta and G. Memmi. 2018. Enhancing data protection with a structure-wise fragmentation and dispersal of encrypted data. In The 17th IEEE Int. Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-18)."},{"key":"#cr-split#-e_1_3_2_1_14_1.1","doi-asserted-by":"crossref","unstructured":"G. O. Karame C. Soriente K. Lichota and S. Capkun. 2018. Securing Cloud Data under Key Exposure. IEEE Transactions on Cloud Computing (2018) 1--1. https:\/\/doi.org\/10.1109\/TCC.2017.2670559 10.1109\/TCC.2017.2670559","DOI":"10.1109\/TCC.2017.2670559"},{"key":"#cr-split#-e_1_3_2_1_14_1.2","doi-asserted-by":"crossref","unstructured":"G. O. Karame C. Soriente K. Lichota and S. Capkun. 2018. Securing Cloud Data under Key Exposure. IEEE Transactions on Cloud Computing (2018) 1--1. https:\/\/doi.org\/10.1109\/TCC.2017.2670559","DOI":"10.1109\/TCC.2017.2670559"},{"volume-title":"Introduction to Modern Cryptography","author":"Katz Jonathan","key":"e_1_3_2_1_15_1","unstructured":"Jonathan Katz and Yehuda Lindell . 2014. Introduction to Modern Cryptography , second edition (Chapman & Hall\/Crc Cryptography and Network Security Series). Chapman & Hall\/CRC. Jonathan Katz and Yehuda Lindell. 2014. Introduction to Modern Cryptography, second edition (Chapman & Hall\/Crc Cryptography and Network Security Series). Chapman & Hall\/CRC."},{"volume-title":"Advances in Cryptology -- CRYPTO' 93, Douglas R","author":"Krawczyk Hugo","key":"e_1_3_2_1_16_1","unstructured":"Hugo Krawczyk . 1994. Secret Sharing Made Short . In Advances in Cryptology -- CRYPTO' 93, Douglas R . Stinson (Ed.). Springer Berlin Heidelberg , Berlin, Heidelberg , 136--146. Hugo Krawczyk. 1994. Secret Sharing Made Short. In Advances in Cryptology -- CRYPTO' 93, Douglas R. Stinson (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 136--146."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-42033-7_23"},{"volume-title":"Theory of Cryptography","author":"Maurer Ueliand","key":"e_1_3_2_1_18_1","unstructured":"Ueliand Maurer , Renato Renner , and Clemens Holenstein . 2004. Indifferentiability , Impossibility Results on Reductions, and Applications to the Random Oracle Methodology . In Theory of Cryptography , Moni Naor (Ed.). Springer Berlin Heidelberg , Berlin, Heidelberg . Ueliand Maurer, Renato Renner, and Clemens Holenstein. 2004. Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle Methodology. In Theory of Cryptography, Moni Naor (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.06.031"},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the 9th USENIX Conference on File and Stroage Technologies (FAST'11)","author":"Jason","year":"1960","unstructured":"Jason K. Resch and James S. Plank. 2011. AONT-RS: Blending Security and Performance in Dispersed Storage Systems . In Proceedings of the 9th USENIX Conference on File and Stroage Technologies (FAST'11) . USENIX Association, Berkeley, CA, USA, 14--14. http:\/\/dl.acm.org\/citation.cfm?id= 1960 475.1960489 Jason K. Resch and James S. Plank. 2011. AONT-RS: Blending Security and Performance in Dispersed Storage Systems. In Proceedings of the 9th USENIX Conference on File and Stroage Technologies (FAST'11). USENIX Association, Berkeley, CA, USA, 14--14. http:\/\/dl.acm.org\/citation.cfm?id=1960475.1960489"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/647932.740733"},{"volume-title":"Fast Software Encryption","author":"Rivest Ronald L.","key":"e_1_3_2_1_22_1","unstructured":"Ronald L. Rivest . 1997 b. All-Or-Nothing Encryption and The Package Transform . In In Fast Software Encryption , LNCS. Springer-Verlag , 210--218. Ronald L. Rivest. 1997 b. All-Or-Nothing Encryption and The Package Transform. In In Fast Software Encryption, LNCS. Springer-Verlag, 210--218."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008304703074"}],"event":{"name":"ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Taipei Taiwan","acronym":"ASIA CCS '20"},"container-title":["Proceedings of the 15th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320269.3372198","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3320269.3372198","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:04:52Z","timestamp":1750273492000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320269.3372198"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,5]]},"references-count":24,"alternative-id":["10.1145\/3320269.3372198","10.1145\/3320269"],"URL":"https:\/\/doi.org\/10.1145\/3320269.3372198","relation":{},"subject":[],"published":{"date-parts":[[2020,10,5]]},"assertion":[{"value":"2020-10-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}