Safeguarding cryptographic keys

@inproceedings{Blakley2010SafeguardingCK,
  title={Safeguarding cryptographic keys},
  author={G. R. Blakley},
  year={2010}
}
Certain cryptographic keys, such as a number which makes it possible to compute the secret decoding exponent in an RSA public key cryptosystem,1,5 or the system master key and certain other keys in a DES cryptosystem,3 are so important that they present a dilemma. If too many copies are distributed one might go astray. If too few copies are made they might all be destroyed. A typical cryptosystem will have several volatile copies of an important key in protected memory locations where they will… CONTINUE READING
Highly Influential
This paper has highly influenced 99 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 3,127 citations. REVIEW CITATIONS

From This Paper

Topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 1,219 extracted citations

A novel linear secret sharing scheme with multiple prime moduli

2017 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD) • 2017
View 12 Excerpts
Highly Influenced

An asymptotically perfect secret sharing scheme based on the Chinese Remainder Theorem

Int. J. Comput. Math. • 2017
View 4 Excerpts
Method Support
Highly Influenced

An efficient lossless (2, n) secret image sharing based on Blakley's scheme

2017 IEEE 19th International Workshop on Multimedia Signal Processing (MMSP) • 2017
View 8 Excerpts
Method Support
Highly Influenced

Secret sharing scheme using gray code and XOR operation

2017 Second International Conference on Electrical, Computer and Communication Technologies (ICECCT) • 2017
View 5 Excerpts
Method Support
Highly Influenced

Modeling Privacy and Tradeoffs in Multichannel Secret Sharing Protocols

2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) • 2016
View 7 Excerpts
Method Support
Highly Influenced

Parity Check based redistribution of secret shares

2015 IEEE International Symposium on Information Theory (ISIT) • 2015
View 10 Excerpts
Highly Influenced

3,128 Citations

0100200300'08'11'14'17
Citations per Year
Semantic Scholar estimates that this publication has 3,128 citations based on the available data.

See our FAQ for additional information.