Paper 2023/1785

There Is Always a Way Out! Destruction-Resistant Key Management: Formal Definition and Practical Instantiation

Yaqing Song, University of Electronic Science and Technology of China
Yuan Zhang, University of Electronic Science and Technology of China
Shiyu Li, The University of Virginia
Weijia Li, University of Electronic Science and Technology of China
Zeqi Lai, Tsinghua University
Qiang Tang, The University of Sydney
Abstract

A central advantage of deploying cryptosystems is that the security of large high-sensitive data sets can be reduced to the security of a very small key, i.e., a master key. The most popular way to manage the master key is to use $(t,n)-$threshold secret sharing schemes: a user splits and distributes her/his key among $n$ key servers, and can recover the key with the aid of any $t$ of them. However, it is vulnerable to device destruction: if all key servers and users' devices break down, the key will be permanently lost. We propose a Destruction-Resistant Key Management scheme, dubbed DRKM, which ensures the key availability even if destruction occurs. In DRKM, a user utilizes her/his $n^{*}$ personal identification factors (PIFs) to derive a cryptographic key but can retrieve the key using any $t^{*}$ of the $n^{*}$ PIFs. As most PIFs can be retrieved by the user per se without requiring stateful devices, destruction resistance is achieved. With the integration of a $(t,n)-$threshold secret sharing scheme, DRKM achieves portable key access by invoking any $t$ key servers before destruction occurs. We prove the DRKM's security, implement its prototype, and conduct a comprehensive performance evaluation to demonstrate its high efficiency.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Preprint.
Keywords
Destruction resistanceKey managementReconstructable PIFs
Contact author(s)
YaqingS @ 163 com
zhangyuan @ uestc edu cn
tkp2ra @ virginia edu
tokio_0 @ 163 com
zeqilai @ tsinghua edu cn
qiang tang @ sydney edu au
History
2025-04-29: last of 3 revisions
2023-11-18: received
See all versions
Short URL
https://ia.cr/2023/1785
License
Creative Commons Attribution-NonCommercial
CC BY-NC

BibTeX

@misc{cryptoeprint:2023/1785,
      author = {Yaqing Song and Yuan Zhang and Shiyu Li and Weijia Li and Zeqi Lai and Qiang Tang},
      title = {There Is Always a Way Out! Destruction-Resistant Key Management: Formal Definition and Practical Instantiation},
      howpublished = {Cryptology {ePrint} Archive, Paper 2023/1785},
      year = {2023},
      url = {https://eprint.iacr.org/2023/1785}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.