Making Decryption Accountable

被引:4
作者
Ryan, Mark D. [1 ]
机构
[1] Univ Birmingham, Birmingham, W Midlands, England
来源
SECURITY PROTOCOLS XXV | 2017年 / 10476卷
基金
英国工程与自然科学研究理事会;
关键词
D O I
10.1007/978-3-319-71075-4_11
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Decryption is accountable if the users that create ciphertexts can gain information about the circumstances of the decryptions that are later obtained. We describe a protocol that forces decryptors to create such information. The information can't be discarded or suppressed without detection. The protocol relies on a trusted hardware device. We describe some applications.
引用
收藏
页码:93 / 98
页数:6
相关论文
共 8 条
[1]   Keys under doormats: mandating insecurity by requiring government access to all data and communications [J].
Abelson, Harold ;
Anderson, Ross ;
Bellovin, Steven M. ;
Benaloh, Josh ;
Blaze, Matt ;
Diffie, Whitfield ;
Gilmore, John ;
Green, Matthew ;
Landau, Susan ;
Neumann, Peter G. ;
Rivest, Ronald L. ;
Schiller, Jeffrey I. ;
Schneier, Bruce ;
Specter, Michael A. ;
Weitzner, Daniel J. .
JOURNAL OF CYBERSECURITY, 2015, 1 (01) :69-79
[2]  
[Anonymous], 2016, INVESTIGATORY POWERS
[3]  
[Anonymous], 2007, CERTIFICATE TRANSPAR
[4]  
[Anonymous], 2014, NETWORK DISTRIBUTED
[5]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[6]  
Chuat L, 2015, IEEE CONF COMM NETW, P415, DOI 10.1109/CNS.2015.7346853
[7]  
Garman C., 2016, IACR CRYPTOLOGY EPRI, V61
[8]  
Liu J., 2014, CSF