Hot Keywords
Cyber-physical systems Post-quantum cryptography Public-key cryptography Edge computing Anti-forensics Big data security control selection Attacks on IoT systems Domain Name System DNS attacks Network security Transport layer security protocol

Topic: Key Management and Key Recovery

A special issue of Journal of Surveillance, Security and Safety

ISSN 2694-1015 (Online)

Submission deadline: 31 May 2023

Guest Editor(s)

  • Prof. Moti Yung

    Department of Computer Science, Columbia University, New York, NY, USA.

    Google LLC, Mountain View, CA, USA.

    Website | E-mail

  • Prof. Josef Pieprzyk

    The Commonwealth Scientific and Industrial Research Organisation (CSIRO), Marsfield, Australia.

    Institute of Computer Science, Polish Academy of Sciences, Warsaw, Poland.

    Website | E-mail

Special Issue Introduction

Almost all Internet services include cryptographic components and protocols that provide a wide range of required security goals such as confidentiality, authenticity and integrity. The single and most crucial factor that determines the achieved security goals and their level is the way cryptographic keys are generated, distributed and managed. Often, the scientific literature assumes the existence of these keys (within symmetric or asymmetric cryptosystems) and develops protocols upon them, ignoring the complexity of generating, maintaining, and assuring the security of the underlying keys. Recent developments in quantum computing show that a large portion of public-key cryptography is easily broken by a quantum computer. The post-quantum encryption and digital signatures recommended by NIST require significantly longer cryptographic keys. Similarly, to maintain the same security level for private-key/symmetric encryption, the length of cryptographic keys needs to be doubled. This evidently has a significant impact on management, storage and recovery of cryptographic keys.

This Special Issue addresses all aspects related to classical and quantum key generation, management and recovery of cryptographic keys. Specifically, it covers the following topics:

● Truly random number generation (quantum)

● Pseudorandom bit generation

● Quantum key distribution

● Classical key agreement and establishment protocols

● Key encapsulation protocols

● Public-key infrastructure and key certification

● Secret sharing and key recovery

● Security evaluation/verification

● Long-term maintenance of security of keys

Academics, research students and professionals are invited to submit their original work. Extended conference papers are also welcome, provided they have been revised and contain at least 50% new content (and the previously published proceedings paper is submitted with the research paper).

Submission Deadline

31 May 2023

Submission Information

For Author Instructions, please refer to
For Online Submission, please login at
Submission Deadline: 31 May 2023
Contacts: Yoyo Bai, Assistant Editor,

Published Articles

© 2016-2023 OAE Publishing Inc., except certain content provided by third parties