{"id":"https://openalex.org/W4416549349","doi":"https://doi.org/10.1145/3719027.3765127","title":"How to Recover a Cryptographic Secret From the Cloud","display_name":"How to Recover a Cryptographic Secret From the Cloud","publication_year":2025,"publication_date":"2025-11-19","ids":{"openalex":"https://openalex.org/W4416549349","doi":"https://doi.org/10.1145/3719027.3765127"},"language":null,"primary_location":{"id":"doi:10.1145/3719027.3765127","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3719027.3765127","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5114386764","display_name":"David Adei","orcid":"https://orcid.org/0009-0007-9857-6671"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"David Adei","raw_affiliation_strings":["North Carolina State University, Raleigh, USA"],"raw_orcid":"https://orcid.org/0009-0007-9857-6671","affiliations":[{"raw_affiliation_string":"North Carolina State University, Raleigh, USA","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5120513645","display_name":"Chris Orsini","orcid":"https://orcid.org/0009-0000-8973-1691"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Chris Orsini","raw_affiliation_strings":["North Carolina State University, Raleigh, USA"],"raw_orcid":"https://orcid.org/0009-0000-8973-1691","affiliations":[{"raw_affiliation_string":"North Carolina State University, Raleigh, USA","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061801673","display_name":"Alessandra Scafuro","orcid":"https://orcid.org/0000-0003-1797-9457"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Alessandra Scafuro","raw_affiliation_strings":["North Carolina State University, Raleigh, USA"],"raw_orcid":"https://orcid.org/0000-0003-1797-9457","affiliations":[{"raw_affiliation_string":"North Carolina State University, Raleigh, USA","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5115859000","display_name":"Tanner Verber","orcid":"https://orcid.org/0009-0007-4349-6690"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tanner Verber","raw_affiliation_strings":["North Carolina State University, Raleigh, USA and Horizen Labs, Raleigh, USA"],"raw_orcid":"https://orcid.org/0009-0007-4349-6690","affiliations":[{"raw_affiliation_string":"North Carolina State University, Raleigh, USA and Horizen Labs, Raleigh, USA","institution_ids":["https://openalex.org/I137902535"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5114386764"],"corresponding_institution_ids":["https://openalex.org/I137902535"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.47631545,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1814","last_page":"1828"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.7603999972343445,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.7603999972343445,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.15070000290870667,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.0364999994635582,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.7357000112533569},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7093999981880188},{"id":"https://openalex.org/keywords/backup","display_name":"Backup","score":0.6061000227928162},{"id":"https://openalex.org/keywords/insider","display_name":"Insider","score":0.5968999862670898},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.5629000067710876},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.5597000122070312},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.5472999811172485},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.517799973487854}],"concepts":[{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.7357000112533569},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7210999727249146},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7093999981880188},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6841999888420105},{"id":"https://openalex.org/C2780945871","wikidata":"https://www.wikidata.org/wiki/Q194274","display_name":"Backup","level":2,"score":0.6061000227928162},{"id":"https://openalex.org/C2778971194","wikidata":"https://www.wikidata.org/wiki/Q1664551","display_name":"Insider","level":2,"score":0.5968999862670898},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.5629000067710876},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.5597000122070312},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.5472999811172485},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.517799973487854},{"id":"https://openalex.org/C2778222013","wikidata":"https://www.wikidata.org/wiki/Q1136926","display_name":"Alice (programming language)","level":2,"score":0.48649999499320984},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.46639999747276306},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.3937000036239624},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.3560999929904938},{"id":"https://openalex.org/C9996903","wikidata":"https://www.wikidata.org/wiki/Q1749235","display_name":"Cryptographic nonce","level":3,"score":0.3280999958515167},{"id":"https://openalex.org/C127964579","wikidata":"https://www.wikidata.org/wiki/Q649676","display_name":"Alice and Bob","level":3,"score":0.31470000743865967},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.3095000088214874},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3068000078201294},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.30410000681877136},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2953999936580658},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.2815000116825104},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.2587999999523163},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.250900000333786}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3719027.3765127","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3719027.3765127","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1656028867","https://openalex.org/W1892798954","https://openalex.org/W1970606468","https://openalex.org/W2052422475","https://openalex.org/W2136720346","https://openalex.org/W2608006758","https://openalex.org/W2613137163","https://openalex.org/W2621151780","https://openalex.org/W2755469263","https://openalex.org/W2757888293","https://openalex.org/W2795336163","https://openalex.org/W2927856397","https://openalex.org/W2981490235","https://openalex.org/W3159239494","https://openalex.org/W3203857285","https://openalex.org/W4380680625"],"related_works":[],"abstract_inverted_index":{"Clouds":[0],"have":[1,69],"replaced":[2],"most":[3,178],"local":[4],"backup":[5,25],"systems":[6],"as":[7,24],"they":[8],"offer":[9],"strong":[10],"availability":[11],"and":[12,56,92,112,214],"reliability":[13],"guarantees.":[14],"Clouds,":[15],"however,":[16],"are":[17],"not":[18,21,149],"(and":[19],"should":[20],"be)":[22],"used":[23],"for":[26,64],"cryptographic":[27,87],"secrets.":[28],"Cryptographic":[29],"secrets":[30,41,88,176],"might":[31],"control":[32],"financial":[33,51],"assets":[34,52],"(e.g.,":[35],"crypto":[36],"wallets),":[37],"hence,":[38],"storing":[39],"such":[40],"on":[42,89,190],"the":[43,50,54,58,70,73,90,95,118,155,191,205],"cloud":[44,59,91,160],"corresponds":[45],"to":[46],"sharing":[47],"ownership":[48,123],"of":[49,72,85,124,157],"with":[53,162,184],"cloud,":[55],"makes":[57],"a":[60,77,83,132,158,163],"more":[61],"attractive":[62],"target":[63],"insider":[65],"attacks.":[66],"Can":[67,102],"we":[68,130,210],"best":[71],"two":[74],"worlds,":[75],"where":[76,141],"user,":[78],"Alice,":[79],"can":[80,99,172],"conveniently":[81],"store":[82],"copy":[84],"her":[86,110,125,151,169,175],"she":[93,103,108,171],"is":[94,143,181],"only":[96],"one":[97],"who":[98],"recover":[100,174],"them?":[101],"do":[104],"so":[105],"even":[106,153],"when":[107,146],"loses":[109,167],"devices":[111],"forgets":[113],"all":[114,168,185],"credentials,":[115,152,170],"while":[116],"at":[117],"same":[119],"time":[120],"retaining":[121],"full":[122],"secrets?":[126],"In":[127],"this":[128],"paper,":[129],"provide":[131],"cloud-based":[133],"secret-recovery":[134],"mechanism":[135],"using":[136],"trusted":[137],"execution":[138],"environments":[139],"(TEE)":[140],"confidentiality":[142],"always":[144],"guaranteed":[145],"Alice":[147,166,194],"has":[148],"lost":[150],"in":[154,182,204],"presence":[156],"malicious":[159],"fitted":[161],"TEE.":[164],"If":[165],"still":[173],"(in":[177],"circumstances).":[179],"This":[180],"contrast":[183],"previous":[186],"work":[187],"that":[188,193],"relies":[189],"assumption":[192],"remembers":[195],"some":[196],"authentication":[197],"secret.":[198],"We":[199],"prove":[200],"our":[201,212],"system":[202],"secure":[203],"Universally":[206],"Composable":[207],"framework.":[208],"Further,":[209],"implement":[211],"protocols":[213],"evaluate":[215],"their":[216],"performance.":[217]},"counts_by_year":[],"updated_date":"2025-11-28T17:06:57.423511","created_date":"2025-11-23T00:00:00"}
