Subject: Complexity theory | Encryption | Information management | [ INFO ] Computer Science [cs] | Timing | Noise | Privacy | Key recovery | Data handling | Big data
Encryption key loss problem is the Achilles's heel of cryptography. Key escrow helps, but favors disclosures. Schemes for recoverable encryption keys through noised secret sharing alleviate the dilemma. Key owner escrows a specifically encrypted backup. The recovery nee... View more
 ARO Meeting on Cloud Security. GMU March 11- 12,2013. http://csis.gmu.edu/albanese/events/march-2013-cloudsecurity-meeting/ .
 Jajodia, S., Litwin, W., Schwarz, Th., S.J. Recoverable Encryption through a Noised Secret over a Large Cloud. 5th Inl. Conf. on Data Management in Cloud, Grid and P2P Systems (Globe 2012 ). Springer Verlag, Lecture Notes in Comp. Sc.
 Jajodia, S., Litwin, W., Schwarz, Th., S.J. Recoverable Encryption through a Noised Secret over a Large Cloud. Intl. Journal on Large-Scale Data and Knowledge-Centered Systems, TLDKS IX, LNCS 7980, 2013.
 Jajodia, S., Litwin, W., Schwarz, Th., S.J. Key Recovery Using Noised Secret Sharing with Discounts and Large Clouds. Lamsade Research Report. July 2013 http://www.lamsade.dauphine.fr/~litwin/cours98/CoursBD/Key%2 0Recovery%20with%20Discounts%20Res%20Rep.pdf
 Raluca Ada Popa, Redfield, C., Zeldovich, N. & Balakrishnan, H. CryptDB: Protecting Confidentiality with Encrypted Query Processing. SOSP '11, October 23-26, 2011, Cascais, Portugal.
 Smith, K. How Practical Is Computable Encryption? In.