Recoverable Encryption Through Noised Secret

نویسندگان

  • Sushil Jajodia
  • W. Litwin
چکیده

Encryption key safety is the Achilles’ heel of modern cryptography. Simple backup copies offset the risk of key loss, but increase the danger of disclosure, including at the escrow’s site. Recoverable Encryption (RE) alleviates the dilemma. The backup is specifically encrypted so that recovery by brute force, i.e., without any hint from the key owner, remains possible. We propose RE using a noised secret, RENS in short. To dissuade indelicate attempts, the owner sets up the decryption complexity so that recovery time at the escrow’s facility, a computer or perhaps a cluster, becomes inhibitive. The actual recovery fits the time desired by the requestor, using distributed processing over a large cloud. A 10K-node cloud may suffice to recover the key in ten minutes, for the dissuasive set up of seventy days for a single computer. Large public clouds are now available with acceptable price tags. Their sheer size makes the illegal use unlikely. We show feasibility of RENS schemes possibly of interest to numerous applications.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Recoverable Encryption through Noised Secret over a Large Cloud

The safety of keys is the Achilles’ heel of cryptography. A key backup at an escrow service lowers the risk of loosing the key, but increases the danger of key disclosure. We propose Recoverable Encryption (RE) schemes that alleviate the dilemma. RE encrypts a backup of the key in a manner that restricts practical recovery by an escrow service to one using a large cloud. For example, a cloud wi...

متن کامل

Design and formal verification of DZMBE+

In this paper, a new broadcast encryption scheme is presented based on threshold secret sharing and secure multiparty computation. This scheme is maintained to be dynamic in that a broadcaster can broadcast a message to any of the dynamic groups of users in the system and it is also fair in the sense that no cheater is able to gain an unfair advantage over other users. Another important feature...

متن کامل

ECG Steganography Based Privacy Protecting Of Medical Data for Telemedicine Application

The project proposes the enhancement of protection system for secret data communication through encrypted data concealment in ECG signals. The proposed encryption technique used to encrypt the confidential data into unreadable form and not only enhances the safety of secret carrier information by making the information inaccessible to any intruder having a random method. After data encryption, ...

متن کامل

Computationally secure multiple secret sharing: models, schemes, and formal security analysis

A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...

متن کامل

Improving the Rao-Nam secret key cryptosystem using regular EDF-QC-LDPC codes

This paper proposes an efficient joint secret key encryption-channel coding cryptosystem, based on regular Extended Difference Family Quasi-Cyclic Low-Density Parity-Check codes. The key length of the proposed cryptosystem decreases up to 85 percent using a new efficient compression algorithm. Cryptanalytic methods show that the improved cryptosystem has a significant security advantage over Ra...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011