KISS: "Key It Simple and Secure" corporate key management

Zongwei Zhou, Jun Han, Yue Hsun Lin, Adrian Perrig, Virgil Gligor

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)


Deploying a corporate key management system faces fundamental challenges, such as fine-grained key usage control and secure system administration. None of the current commercial systems (either based on software or hardware security modules) or research proposals adequately address both challenges with small and simple Trusted Computing Base (TCB). This paper presents a new key management architecture, called KISS, to enable comprehensive, trustworthy, user-verifiable, and cost-effective key management. KISS protects the entire life cycle of cryptographic keys. In particular, KISS allows only authorized applications and/or users to use the keys. Using simple devices, administrators can remotely issue authenticated commands to KISS and verify system output. KISS leverages readily available commodity hardware and trusted computing primitives to design system bootstrap protocols and management mechanisms, which protects the system from malware attacks and insider attacks.

Original languageEnglish
Title of host publicationTrust and Trustworthy Computing - 6th International Conference, TRUST 2013, Proceedings
Number of pages18
Publication statusPublished - 2013
Event6th International Conference on Trust and Trustworthy Computing, TRUST 2013 - London, United Kingdom
Duration: 2013 Jun 172013 Jun 19

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7904 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Conference6th International Conference on Trust and Trustworthy Computing, TRUST 2013
Country/TerritoryUnited Kingdom

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)


Dive into the research topics of 'KISS: "Key It Simple and Secure" corporate key management'. Together they form a unique fingerprint.

Cite this