Making Decryption Accountable

Research output: Chapter in Book/Report/Conference proceedingConference contribution


Colleges, School and Institutes


Decryption is accountable if the users that create ciphertexts can gain information about the circumstances of the decryptions that are later obtained. We describe a protocol that forces decryptors to create such information. The information can’t be discarded or suppressed without detection. The protocol relies on a trusted hardware device. We describe some applications.


Original languageEnglish
Title of host publicationSecurity Protocols XXV
Subtitle of host publication25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers
EditorsJonathan Anderson, Bruce Christianson, Vashek Matyas, Frank Stajano
Publication statusPublished - 2017
EventTwenty-fifth International Workshop on Security Protocols - Cambridge, United Kingdom
Duration: 20 Mar 201722 Mar 2017

Publication series

NameLecture Notes in Computer Science
VolumeXXV (25)
ISSN (Print)0302-9743


ConferenceTwenty-fifth International Workshop on Security Protocols
CountryUnited Kingdom