Vis enkel innførsel

dc.contributor.authorDavies, Gareth Thomas
dc.contributor.authorGalteland, Herman
dc.contributor.authorGjøsteen, Kristian
dc.contributor.authorJiang, Yao
dc.date.accessioned2021-09-06T12:09:18Z
dc.date.available2021-09-06T12:09:18Z
dc.date.created2020-09-01T11:12:48Z
dc.date.issued2020
dc.identifier.citationLecture Notes in Computer Science (LNCS). 2020, 12248 LNCS 82-101.en_US
dc.identifier.issn0302-9743
dc.identifier.urihttps://hdl.handle.net/11250/2773766
dc.description.abstractIn cloud-based outsourced storage systems, many users wish to securely store their files for later retrieval, and additionally to share them with other users. These retrieving users may not be online at the point of the file upload, and in fact they may never come online at all. In this asynchronous environment, key transport appears to be at odds with any demands for forward secrecy. Recently, Boyd et al. (ISC 2018) presented a protocol that allows an initiator to use a modified key encapsulation primitive, denoted a blinded KEM (BKEM), to transport a file encryption key to potentially many recipients via the (untrusted) storage server, in a way that gives some guarantees of forward secrecy. Until now all known constructions of BKEMs are built using RSA and DDH, and thus are only secure in the classical setting. We further the understanding of the use of blinding in post-quantum cryptography in two aspects. First, we show how to generically build blinded KEMs from homomorphic encryption schemes with certain properties. Second, we construct the first post-quantum secure blinded KEMs, and the security of our constructions are based on hard lattice problems.en_US
dc.language.isoengen_US
dc.publisherSpringeren_US
dc.titleCloud-assisted Asynchronous Key Transport with Post-Quantum Securityen_US
dc.typePeer revieweden_US
dc.typeJournal articleen_US
dc.description.versionpublishedVersionen_US
dc.source.pagenumber82-101en_US
dc.source.volume12248 LNCSen_US
dc.source.journalLecture Notes in Computer Science (LNCS)en_US
dc.identifier.doihttps://doi.org/10.1007/978-3-030-55304-3_5
dc.identifier.cristin1826422
dc.description.localcodeThis article will not be available due to copyright restrictions (c) 2020 by Springeren_US
cristin.ispublishedtrue
cristin.fulltextoriginal
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel