{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:22:34Z","timestamp":1766442154534,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,19]]},"DOI":"10.1145\/3719027.3765127","type":"proceedings-article","created":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T23:33:16Z","timestamp":1763854396000},"page":"1814-1828","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["How to Recover a Cryptographic Secret From the Cloud"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-9857-6671","authenticated-orcid":false,"given":"David","family":"Adei","sequence":"first","affiliation":[{"name":"North Carolina State University, Raleigh, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-8973-1691","authenticated-orcid":false,"given":"Chris","family":"Orsini","sequence":"additional","affiliation":[{"name":"North Carolina State University, Raleigh, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1797-9457","authenticated-orcid":false,"given":"Alessandra","family":"Scafuro","sequence":"additional","affiliation":[{"name":"North Carolina State University, Raleigh, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-4349-6690","authenticated-orcid":false,"given":"Tanner","family":"Verber","sequence":"additional","affiliation":[{"name":"North Carolina State University, Raleigh, USA and Horizen Labs, Raleigh, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,11,22]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"The security design of the aws nitro system. https:\/\/docs.aws.amazon.com\/pdfs\/whitepapers\/latest\/security-design-of-aws-nitro-system\/security-design-of-aws-nitro-system.pdf","author":"Services Amazon Web","year":"2022","unstructured":"Amazon Web Services. The security design of the aws nitro system. https:\/\/docs.aws.amazon.com\/pdfs\/whitepapers\/latest\/security-design-of-aws-nitro-system\/security-design-of-aws-nitro-system.pdf, 2022."},{"key":"e_1_3_2_2_2_1","unstructured":"How to recover my wallet with guardians: complete guide. https:\/\/support.argent.xyz\/hc\/en-us\/articles\/360007338877-How-to-recover-my-wallet-with-guardians-complete-guide."},{"key":"e_1_3_2_2_3_1","volume-title":"Private key encryption and recovery in blockchain. CoRR, abs\/1907.04156","author":"Aydar M.","year":"2019","unstructured":"M. Aydar, S. C. Cetin, S. Ayvaz, and B. Ayg\u00fcn. Private key encryption and recovery in blockchain. CoRR, abs\/1907.04156, 2019."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC51069.2021.9461099"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/888619"},{"key":"e_1_3_2_2_6_1","first-page":"78","volume-title":"CCS '97, Proceedings of the 4th ACM Conference on Computer and Communications Security","author":"Bellare M.","year":"1997","unstructured":"M. Bellare and S. Goldwasser. Verifiable partial key escrow. In R. Graveman, P. A. Janson, C. Neuman, and L. Gong, editors, CCS '97, Proceedings of the 4th ACM Conference on Computer and Communications Security, Zurich, Switzerland, April 1-4, 1997, pages 78-91. ACM, 1997."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44448-3_41"},{"key":"e_1_3_2_2_8_1","first-page":"169","volume-title":"2014 USENIX Annual Technical Conference, USENIX ATC '14","author":"Bessani A. N.","year":"2014","unstructured":"A. N. Bessani, R. Mendes, T. Oliveira, N. F. Neves, M. Correia, M. Pasin, and P. Ver\u00edssimo. SCFS: A shared cloud-backed file system. In G. Gibson and N. Zeldovich, editors, 2014 USENIX Annual Technical Conference, USENIX ATC '14, Philadelphia, PA, USA, June 19-20, 2014, pages 169-180. USENIX Association, 2014."},{"key":"e_1_3_2_2_9_1","unstructured":"Set up wallet recovery wizard. https:\/\/developers.bitgo.com\/guides\/wallets\/recover."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-63958-0_34"},{"key":"e_1_3_2_2_11_1","unstructured":"BLS Signatures implementation. https:\/\/pypi.org\/project\/blspy\/."},{"key":"e_1_3_2_2_12_1","unstructured":"Hardware protected signer faqs. https:\/\/braavos.notion.site\/Hardware-Protected-Signer-FAQs-5d5ae07e999e45ddaf8a7f5c4abbad80."},{"key":"e_1_3_2_2_13_1","volume-title":"Why we need wide adoption of social recovery wallets. https:\/\/vitalik.eth.limo\/general\/2021\/01\/11\/recovery.html","author":"Buterin V.","year":"2021","unstructured":"V. Buterin. Why we need wide adoption of social recovery wallets. https:\/\/vitalik.eth.limo\/general\/2021\/01\/11\/recovery.html, 2021."},{"key":"e_1_3_2_2_14_1","volume-title":"EIP-4337: Basefee Network Upgrade","author":"Buterin V.","year":"2021","unstructured":"V. Buterin, Y. Weiss, D. Tirosh, S. Nacson, A. Forshtat, K. Gazso, and T. Hess. EIP-4337: Basefee Network Upgrade, 2021."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2017.38"},{"key":"e_1_3_2_2_16_1","volume-title":"Acsesor: A new framework for auditable custodial secret storage and recovery. IACR Cryptol. ePrint Arch., page 1729","author":"Chase M.","year":"2022","unstructured":"M. Chase, H. Davis, E. Ghosh, and K. Laine. Acsesor: A new framework for auditable custodial secret storage and recovery. IACR Cryptol. ePrint Arch., page 1729, 2022."},{"key":"e_1_3_2_2_17_1","volume-title":"Sok: Web3 recovery mechanisms. IACR Cryptol. ePrint Arch., page 1575","author":"Chatzigiannis P.","year":"2023","unstructured":"P. Chatzigiannis, K. Chalkias, A. Kate, E. V. Mangipudi, M. Minaei, and M. Mondal. Sok: Web3 recovery mechanisms. IACR Cryptol. ePrint Arch., page 1575, 2023."},{"key":"e_1_3_2_2_18_1","first-page":"703","volume-title":"18th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2024","author":"Connell G.","year":"2024","unstructured":"G. Connell, V. Fang, R. Schmidt, E. Dauterman, and R. A. Popa. Secret key recovery in a global-scale end-to-end encryption system. In A. Gavrilovska and D. B. Terry, editors, 18th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2024, Santa Clara, CA, USA, July 10-12, 2024, pages 703-719. USENIX Association, 2024."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36178-2_8"},{"key":"e_1_3_2_2_20_1","first-page":"1121","volume-title":"14th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2020","author":"Dauterman E.","year":"2020","unstructured":"E. Dauterman, H. Corrigan-Gibbs, and D. Mazi\u00e8res. Safetypin: Encrypted backups with human-memorable secrets. In 14th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2020, Virtual Event, November 4-6, 2020, pages 1121-1138. USENIX Association, 2020."},{"key":"e_1_3_2_2_21_1","first-page":"2445","volume-title":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, CCS 2024","author":"Faller S. H.","year":"2024","unstructured":"S. H. Faller, T. Handirk, J. Hesse, M. Horv\u00e1th, and A. Lehmann. Password-protected key retrieval with(out) HSM protection. In B. Luo, X. Liao, J. Xu, E. Kirda, and D. Lie, editors, Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, CCS 2024, Salt Lake City, UT, USA, October 14-18, 2024, pages 2445-2459. ACM, 2024."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/227234.227238"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1137\/0218012"},{"key":"e_1_3_2_2_24_1","unstructured":"Hyperledger. Hyperledger\/fabric. https:\/\/github.com\/hyperledger\/fabric."},{"key":"e_1_3_2_2_25_1","unstructured":"A Blockchain Platform for the Enterprise. https:\/\/hyperledger-fabric.readthedocs.io\/en\/latest\/index.html."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-61204-1_3"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78372-7_15"},{"key":"e_1_3_2_2_28_1","volume-title":"Giving state to the stateless: Augmenting trustworthy computation with ledgers","author":"Kaptchuk G.","year":"2019","unstructured":"G. Kaptchuk, M. Green, and I. Miers. Giving state to the stateless: Augmenting trustworthy computation with ledgers, 2019."},{"key":"e_1_3_2_2_29_1","volume-title":"Anarkey: A new approach to (socially) recover keys. Cryptology ePrint Archive","author":"Kate A.","year":"2025","unstructured":"A. Kate, P. Mukherjee, H. Saleem, P. Sarkar, and B. Roberts. Anarkey: A new approach to (socially) recover keys. Cryptology ePrint Archive, 2025."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1201\/b17668"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3318041.3355464"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-70896-1_14"},{"key":"e_1_3_2_2_33_1","unstructured":"Legrandin. Legrandin\/pycryptodome: A self-contained cryptographic library for python. https:\/\/github.com\/Legrandin\/pycryptodome?tab=readme-ov-file."},{"key":"e_1_3_2_2_34_1","volume-title":"Online","author":"Lindell Y.","year":"2023","unstructured":"Y. Lindell. Cryptography and mpc in the coinbase prime web3 wallet. Online, 2023."},{"key":"e_1_3_2_2_35_1","volume-title":"Interactive authentication. IACR Cryptol. ePrint Arch., page 1682","author":"Maram D.","year":"2022","unstructured":"D. Maram, M. Kelkar, and I. Eyal. Interactive authentication. IACR Cryptol. ePrint Arch., page 1682, 2022."},{"key":"e_1_3_2_2_36_1","first-page":"10","volume-title":"HASP 2013, The Second Workshop on Hardware and Architectural Support for Security and Privacy, Tel-Aviv","author":"McKeen F.","year":"2013","unstructured":"F. McKeen, I. Alexandrovich, A. Berenzon, C. V. Rozas, H. Shafi, V. Shanbhogue, and U. R. Savagaonkar. Innovative instructions and software model for isolated execution. In R. B. Lee and W. Shi, editors, HASP 2013, The Second Workshop on Hardware and Architectural Support for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013, page 10. ACM, 2013."},{"key":"e_1_3_2_2_37_1","first-page":"15","article-title":"Ensuring user authentication and data integrity in multi-cloud environment. Hum. centric Comput","volume":"10","author":"Megouache L.","year":"2020","unstructured":"L. Megouache, A. Zitouni, and M. Djoudi. Ensuring user authentication and data integrity in multi-cloud environment. Hum. centric Comput. Inf. Sci., 10:15, 2020.","journal-title":"Inf. Sci."},{"key":"e_1_3_2_2_38_1","series-title":"Lecture Notes in Computer Science","first-page":"113","volume-title":"Advances in Cryptology - CRYPTO '92, 12th Annual International Cryptology Conference","author":"Micali S.","year":"1992","unstructured":"S. Micali. Fair public-key cryptosystems. In E. F. Brickell, editor, Advances in Cryptology - CRYPTO '92, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings, volume 740 of Lecture Notes in Computer Science, pages 113-138. Springer, 1992."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2016.7906988"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102826"},{"key":"e_1_3_2_2_41_1","unstructured":"Nthparty. Nthparty\/oblivious: Python library that serves as an api for common cryptographic primitives used to implement oprf ot and psi protocols. https:\/\/github.com\/nthparty\/oblivious."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56620-7_10"},{"key":"e_1_3_2_2_43_1","first-page":"177","volume-title":"Proceedings of the 2023 ACM Southeast Conference","author":"A. B.","year":"2023","unstructured":"A. B. Pedin IV, N. Siasi, and M. Sameni. Smart contract-based social recovery wallet management scheme for digital assets. In Proceedings of the 2023 ACM Southeast Conference, pages 177-181, 2023."},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"crossref","unstructured":"R. D. Pietro M. Scarpa M. Giacobbe and A. Puliafito. Secure storage as a service in multi-cloud environment. In A. Puliafito D. Bruneo S. Distefano and F. Longo editors Ad-hoc Mobile and Wireless Networks - 16th International Conference on Ad Hoc Networks and Wireless ADHOC-NOW 2017 Messina Italy September 20-22 2017 Proceedings volume 10517 of Lecture Notes in Computer Science pages 328-341. Springer 2017.","DOI":"10.1007\/978-3-319-67910-5_27"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2330667.2330691"},{"key":"e_1_3_2_2_46_1","unstructured":"Python Package Index - PyPI. https:\/\/pypi.org\/."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17259-6_2"},{"key":"e_1_3_2_2_48_1","volume-title":"Eip-2429: Add ability for recovery of burned keys used in multisig wallets","author":"Schmidt R. G.","year":"2019","unstructured":"R. G. Schmidt, M. Mota, V. Buterin, and naxe. Eip-2429: Add ability for recovery of burned keys used in multisig wallets, 2019."},{"key":"e_1_3_2_2_49_1","unstructured":"Sequence documentation: Key management. https:\/\/docs.sequence.xyz\/key-management\/."},{"key":"e_1_3_2_2_50_1","volume-title":"Key escrow conference","author":"Shamir A.","year":"1995","unstructured":"A. Shamir. Partial key escrow: A new approach to software key escrow. In Key escrow conference, 1995."},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-63958-0_1"},{"key":"e_1_3_2_2_52_1","unstructured":"Torus labs: Open-source key management. https:\/\/tor.us\/."},{"key":"e_1_3_2_2_53_1","unstructured":"Recovery process for the trezor model t. https:\/\/trezor.io\/learn\/a\/recover-wallet-on-model-t."},{"key":"e_1_3_2_2_54_1","first-page":"21","volume-title":"Proceedings of the 2008 ACM Workshop On Storage Security And Survivability, StorageSS 2008","author":"Wilcox-O'Hearn Z.","year":"2008","unstructured":"Z. Wilcox-O'Hearn and B. Warner. Tahoe: the least-authority filesystem. In Y. Kim and W. Yurcik, editors, Proceedings of the 2008 ACM Workshop On Storage Security And Survivability, StorageSS 2008, Alexandria, VA, USA, October 31, 2008, pages 21-26. ACM, 2008."},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.3390\/s23125566"},{"key":"e_1_3_2_2_56_1","unstructured":"Understand the difference: Zengo wallet recovery vs. ledger recover. https:\/\/zengo.com\/understand-the-difference-zengo-wallet-recovery-vs-ledger-recover\/."}],"event":{"name":"CCS '25: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Taipei Taiwan","acronym":"CCS '25"},"container-title":["Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3719027.3765127","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:20:31Z","timestamp":1766442031000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3719027.3765127"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,19]]},"references-count":56,"alternative-id":["10.1145\/3719027.3765127","10.1145\/3719027"],"URL":"https:\/\/doi.org\/10.1145\/3719027.3765127","relation":{},"subject":[],"published":{"date-parts":[[2025,11,19]]},"assertion":[{"value":"2025-11-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}