This paper addresses the problem of using proactive cryptosystems for generic data storage and retrieval. Proactive cryptosystems provide high security and confidentiality guarantees for stored data, and are capable of withstanding attacks that may compromise all the servers in the system over time. However, proactive cryptosystems are unsuitable for generic data storage uses for two reasons. First, proactive cryptosystems are usually used to store keys, which are rarely updated. On the other hand, generic data could be actively written and read. The system must therefore be highly available for both write and read operations. Second, existing share renewal protocols (the critical element to achieve proactive security) are expensive in term...
Fault tolerant and secure distributed data storage systems typically require that only up to a thres...
We present algorithms that reduce the time complexity and improve the scalability of robust storage ...
Trustworthy applications in fully decentralized systems require a trust anchor. This paper describes...
The secure storage of long-lived sensitive data is constantly growing in its relevance due to the ev...
Threshold secret sharing schemes encode data into several shares such that a threshold number of sha...
We present the design of a distributed store that offers various levels of security guarantees whil...
Secret sharing-based distributed storage systems can provide long-term protection of confidentiality...
Secret sharing-based distributed storage systems can provide long-term protection of confidentiality...
Secret sharing-based distributed storage systems can provide long-term protection of confidentiality...
Secret sharing-based distributed storage systems can provide long-term protection of confidentiality...
We present the design of a distributed store that offers various levels of security guarantees while...
Secret sharing-based distributed storage systems can provide long-term protection of confidentiality...
Secret sharing-based distributed storage systems can provide long-term protection of confidentiality...
Secret sharing-based distributed storage systems can provide long-term protection of confidentiality...
This article addresses the critical issue of securing backup storage for confidential data, a key co...
Fault tolerant and secure distributed data storage systems typically require that only up to a thres...
We present algorithms that reduce the time complexity and improve the scalability of robust storage ...
Trustworthy applications in fully decentralized systems require a trust anchor. This paper describes...
The secure storage of long-lived sensitive data is constantly growing in its relevance due to the ev...
Threshold secret sharing schemes encode data into several shares such that a threshold number of sha...
We present the design of a distributed store that offers various levels of security guarantees whil...
Secret sharing-based distributed storage systems can provide long-term protection of confidentiality...
Secret sharing-based distributed storage systems can provide long-term protection of confidentiality...
Secret sharing-based distributed storage systems can provide long-term protection of confidentiality...
Secret sharing-based distributed storage systems can provide long-term protection of confidentiality...
We present the design of a distributed store that offers various levels of security guarantees while...
Secret sharing-based distributed storage systems can provide long-term protection of confidentiality...
Secret sharing-based distributed storage systems can provide long-term protection of confidentiality...
Secret sharing-based distributed storage systems can provide long-term protection of confidentiality...
This article addresses the critical issue of securing backup storage for confidential data, a key co...
Fault tolerant and secure distributed data storage systems typically require that only up to a thres...
We present algorithms that reduce the time complexity and improve the scalability of robust storage ...
Trustworthy applications in fully decentralized systems require a trust anchor. This paper describes...