NuCypher KMS: Decentralized key management system

NuCypher KMS is a decentralized Key Management System (KMS) that addresses the limitations of using consensus networks to securely store and manipulate private, encrypted data. It provides encryption and cryptographic access controls, performed by a decentralized network, leveraging proxy re-encryption. Unlike centralized KMS as a service solutions, it doesn't require trusting a service provider. NuCypher KMS enables sharing of sensitive data for both decentralized and centralized applications, providing security infrastructure for applications from healthcare to identity management to decentralized content marketplaces. NuCypher KMS will be an essential part of decentralized applications, just as SSL/TLS is an essential part of every secure web application.

[1]  Steven Myers,et al.  Efficient Hybrid Proxy Re-Encryption for Practical Revocation and Key Rotation , 2017, IACR Cryptol. ePrint Arch..

[2]  Matt Blaze,et al.  Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.

[3]  Shawn Wilkinson,et al.  Storj A Peer-to-Peer Cloud Storage Network , 2014 .

[4]  Núñez Montañez,et al.  New Security Definitions, Constructions and Applications of Proxy Re-Encryption , 2015 .

[5]  Jason Teutsch,et al.  A scalable verification solution for blockchains , 2019, ArXiv.

[6]  Xavier Boyen,et al.  Proxy Re-Encryption Schemes with Key Privacy from LWE , 2016, IACR Cryptol. ePrint Arch..

[7]  Juan Benet,et al.  IPFS - Content Addressed, Versioned, P2P File System , 2014, ArXiv.

[8]  Iddo Bentov,et al.  How to Use Bitcoin to Design Fair Protocols , 2014, CRYPTO.

[9]  Xiaodong Lin,et al.  Proxy Re-encryption with Delegatable Verifiability , 2016, ACISP.

[10]  Michael T. Goodrich,et al.  Accountable Storage , 2014, ACNS.

[11]  Marcin Andrychowicz,et al.  Secure Multiparty Computations on Bitcoin , 2014, 2014 IEEE Symposium on Security and Privacy.

[12]  Sotiris Ioannidis,et al.  PixelVault: Using GPUs for Securing Cryptographic Operations , 2014, CCS.

[13]  Javier López,et al.  NTRUReEncrypt: An Efficient Proxy Re-Encryption Scheme Based on NTRU , 2015, AsiaCCS.

[14]  Matthew Green,et al.  Managing Secrets with Consensus Networks: Fairness, Ransomware and Access Control , 2017, IACR Cryptol. ePrint Arch..

[15]  Benoît Libert,et al.  Tracing Malicious Proxies in Proxy Re-encryption , 2008, Pairing.

[16]  Javier López,et al.  Proxy Re-Encryption: Analysis of constructions and its application to secure access delegation , 2017, J. Netw. Comput. Appl..

[17]  Liang Gu,et al.  Addressing Leakage of Re-encryption Key in Proxy Re-encryption Using Trusted Computing , 2010, INTRUST.

[18]  Susan Hohenberger,et al.  Key-Private Proxy Re-encryption , 2009, CT-RSA.

[19]  Matthew Green,et al.  Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.

[20]  Alex Pentland,et al.  Enigma: Decentralized Computation Platform with Guaranteed Privacy , 2015, ArXiv.

[21]  Evan Duffield,et al.  Dash: A Privacy-Centric Crypto-Currency , 2017 .