Abstract
Many future applications, such as distributed social networks, will rely on public-key cryptography, and users will want to access them from many locations. Currently, there is no way to store private keys “in the cloud” without placing complete faith in a centralised operator. We propose a protocol that can be used to share secrets such as private keys among several key recovery agents, using a weak password, in a way that prevents insiders from recovering either the private key or the password without significant collusion. This protocol will enable the safe storage of private keys online, which will facilitate the advent of secure, decentralized, globally-accessible systems.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Anderson, J., Diaz, C., Bonneau, J., Stajano, F.: Privacy-Enabling Social Networking Over Untrusted Networks. In: The Second ACM SIGCOMM Workshop on Social Network Systems (WOSN 2009), pp. 1–6 ( May 2009)
Blakeley, R.: Yahoo in second Chinese blogger row. TimesOnline (January 2006)
Beimel, A., Chor, B.: Secret Sharing with Public Reconstruction. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 353–366. Springer, Heidelberg (1995)
Shamir, A.: How to share a secret. Communications of the ACM 22 (November 1979)
Lomas, M., Christianson, B.: Remote Booting in a Hostile World: To Whom Am I Speaking? IEEE Computer, 50–54 (1995)
Wu, T.: The Secure Remote Password Protocol. In: The 1998 Internet Society Network and Distributed System Security Symposium, pp. 97–111 (1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Anderson, J., Stajano, F. (2014). On Storing Private Keys in the Cloud. In: Christianson, B., Malcolm, J. (eds) Security Protocols XVIII. Security Protocols 2010. Lecture Notes in Computer Science, vol 7061. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-45921-8_16
Download citation
DOI: https://doi.org/10.1007/978-3-662-45921-8_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-45920-1
Online ISBN: 978-3-662-45921-8
eBook Packages: Computer ScienceComputer Science (R0)