Making decryption accountable (Transcript of discussion)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

I’ve given the title Making Decryption Accountable to this talk. Let me just start with a little story. When I was a teenager, I wanted to be able to go out in the evening and not tell my parents where I was going because I wanted my privacy. But my parents naturally wanted to make sure that they’d have some recourse if I don’t come back at the expected time. They wanted security in other words. We hit upon a compromise whereby I would put my plans in an envelope, and leave it on the kitchen table or something, and then if I came back at the appointed time I could retrieve the envelope, and by the properties of an envelope I could see it hadn’t been opened, and therefore I knew my privacy hadn’t been violated. But if I didn’t come back at the right time, they at least had some clues as to where they should look for me.

Original languageEnglish
Title of host publicationSecurity Protocols XXV - 25th International Workshop, Revised Selected Papers
EditorsFrank Stajano, Bruce Christianson, Vashek Matyas, Jonathan Anderson
PublisherSpringer Verlag
Pages99-108
Number of pages10
ISBN (Print)9783319710747
DOIs
Publication statusPublished - 2017
Event25th International Workshop on Security Protocols, 2017 - Cambridge, United Kingdom
Duration: 20 Mar 201722 Mar 2017

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume10476 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference25th International Workshop on Security Protocols, 2017
Country/TerritoryUnited Kingdom
CityCambridge
Period20/03/1722/03/17

Bibliographical note

Publisher Copyright:
© Springer International Publishing AG 2017.

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Making decryption accountable (Transcript of discussion)'. Together they form a unique fingerprint.

Cite this