Compact key storage. A modern approach to key backup and delegation
From MaRDI portal
Publication:6648202
DOI10.1007/978-3-031-68379-4_3MaRDI QIDQ6648202
Yevgeniy Dodis, Daniel Jost, Antonio Marcedone
Publication date: 4 December 2024
Cites Work
- Updatable encryption with post-compromise security
- Key rotation for authenticated encryption
- Security analysis and improvements for the IETF MLS standard for group messaging
- Fast and secure updatable encryption
- Secure generalized deduplication via multi-key revealing encryption
- (R)CCA secure updatable encryption with integrity protection
- The double ratchet: security notions, proofs, and modularization for the Signal protocol
- Improving speed and security in updatable encryption schemes
- Contention in Cryptoland: Obfuscation, Leakage and UCE
- Key Homomorphic PRFs and Their Applications
- Constrained Pseudorandom Functions and Their Applications
- Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources
- Interactive Message-Locked Encryption and Secure Deduplication
- Message-Locked Encryption and Secure Deduplication
- Functional Signatures and Pseudorandom Functions
- Security analysis of the WhatsApp end-to-end encrypted backup protocol
This page was built for publication: Compact key storage. A modern approach to key backup and delegation