Special Issue

Topic: Key Management and Key Recovery

A Special Issue of Journal of Surveillance, Security and Safety

ISSN 2694-1015 (Online)

Submission deadline: 31 Oct 2023

Guest Editor(s)

Prof. Moti Yung

Department of Computer Science, Columbia University, New York, NY, USA.

Google LLC, Mountain View, CA, USA.

Prof. Josef Pieprzyk

The Commonwealth Scientific and Industrial Research Organisation (CSIRO), Marsfield, Australia.

Institute of Computer Science, Polish Academy of Sciences, Warsaw, Poland.

Special Issue Introduction

Almost all Internet services include cryptographic components and protocols that provide a wide range of required security goals such as confidentiality, authenticity and integrity. The single and most crucial factor that determines the achieved security goals and their level is the way cryptographic keys are generated, distributed and managed. Often, the scientific literature assumes the existence of these keys (within symmetric or asymmetric cryptosystems) and develops protocols upon them, ignoring the complexity of generating, maintaining, and assuring the security of the underlying keys. Recent developments in quantum computing show that a large portion of public-key cryptography is easily broken by a quantum computer. The post-quantum encryption and digital signatures recommended by NIST require significantly longer cryptographic keys. Similarly, to maintain the same security level for private-key/symmetric encryption, the length of cryptographic keys needs to be doubled. This evidently has a significant impact on management, storage and recovery of cryptographic keys.

This Special Issue addresses all aspects related to classical and quantum key generation, management and recovery of cryptographic keys. Specifically, it covers the following topics:

● Truly random number generation (quantum)

● Pseudorandom bit generation

● Quantum key distribution

● Classical key agreement and establishment protocols

● Key encapsulation protocols

● Public-key infrastructure and key certification

● Secret sharing and key recovery

● Security evaluation/verification

● Long-term maintenance of security of keys

Academics, research students and professionals are invited to submit their original work. Extended conference papers are also welcome, provided they have been revised and contain at least 50% new content (and the previously published proceedings paper is submitted with the research paper).

Submission Deadline

31 Oct 2023

Submission Information

For Author Instructions, please refer to https://oaepublish.com/jsss/author_instructions
For Online Submission, please login at https://oaemesas.com/login?JournalId=jsss&SpecialIssueId=jsss221208
Submission Deadline: 31 Oct 2023
Contacts: Yoyo Bai, Assistant Editor, assistant-editor@jsssjournal.com

Published Articles

Open Access Original Article

Split keys for station-to-station (STS) protocols

This article belongs to the Special Issue Key Management and Key Recovery
J Surveill Secur Saf 2023;4:62-93.
DOI: 10.20517/jsss.2023.16
Available online: 21 Sep 2023
Journal of Surveillance, Security and Safety
ISSN 2694-1015 (Online)
Follow Us

Portico

All published articles are preserved here permanently:

https://www.portico.org/publishers/oae/

Portico

All published articles are preserved here permanently:

https://www.portico.org/publishers/oae/