2020
DOI: 10.1007/978-3-030-58951-6_31
|View full text |Cite
|
Sign up to set email alerts
|

Encrypt-to-Self: Securely Outsourcing Storage

Abstract: We put forward a symmetric encryption primitive tailored towards a specific application: outsourced storage. The setting assumes a memory-bounded computing device that inflates the amount of volatile or permanent memory available to it by letting other (untrusted) devices hold encryptions of information that they return on request. For instance, web servers typically hold for each of the client connections they manage a multitude of data, ranging from user preferences to technical information like database cre… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
37
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(37 citation statements)
references
References 12 publications
0
37
0
Order By: Relevance
“…The Encrypt-to-Self primitive emerged only very recently and little directly related work seems to exist. We already pointed to [11,12] as our main sources of inspiration, and to the work of Dodis et al [4] for a quite similar solution for a different problem. In [11], PP identify the topics of memory encryption, password managers, and encryptment (a notion related to instant messaging) as related to EtS, although there doesn't really seem to be a considerable overlap.…”
Section: Introductionmentioning
confidence: 86%
See 4 more Smart Citations
“…The Encrypt-to-Self primitive emerged only very recently and little directly related work seems to exist. We already pointed to [11,12] as our main sources of inspiration, and to the work of Dodis et al [4] for a quite similar solution for a different problem. In [11], PP identify the topics of memory encryption, password managers, and encryptment (a notion related to instant messaging) as related to EtS, although there doesn't really seem to be a considerable overlap.…”
Section: Introductionmentioning
confidence: 86%
“…We already pointed to [11,12] as our main sources of inspiration, and to the work of Dodis et al [4] for a quite similar solution for a different problem. In [11], PP identify the topics of memory encryption, password managers, and encryptment (a notion related to instant messaging) as related to EtS, although there doesn't really seem to be a considerable overlap. Finally, we note that EtS-like tools have been proposed for the state management of TLS 1.3 variants [2].…”
Section: Introductionmentioning
confidence: 86%
See 3 more Smart Citations