2020
DOI: 10.1007/978-3-030-55304-3_5
|View full text |Cite
|
Sign up to set email alerts
|

Cloud-Assisted Asynchronous Key Transport with Post-Quantum Security

Abstract: In cloud-based outsourced storage systems, many users wish to securely store their files for later retrieval, and additionally to share them with other users. These retrieving users may not be online at the point of the file upload, and in fact they may never come online at all. In this asynchronous environment, key transport appears to be at odds with any demands for forward secrecy. Recently, Boyd et al. (ISC 2018) presented a protocol that allows an initiator to use a modified key encapsulation primitive,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 22 publications
0
1
0
Order By: Relevance
“…However, in this construction, security holds in the so-called future-quantum scenario, where the adversary is assumed to have access to quantum computation only after the protocol execution is completed. Also, a secure group key transport protocol has recently been introduced in [18], which can be instantiated using post-quantum KEMs. The scenario considered in this construction is that in which a user of a cloud server wants to distribute a cryptographic key to other users, with the cooperation of a somewhat untrusted cloud manager.…”
Section: Related Work Post-quantum Group Key Exchangementioning
confidence: 99%
“…However, in this construction, security holds in the so-called future-quantum scenario, where the adversary is assumed to have access to quantum computation only after the protocol execution is completed. Also, a secure group key transport protocol has recently been introduced in [18], which can be instantiated using post-quantum KEMs. The scenario considered in this construction is that in which a user of a cloud server wants to distribute a cryptographic key to other users, with the cooperation of a somewhat untrusted cloud manager.…”
Section: Related Work Post-quantum Group Key Exchangementioning
confidence: 99%