Making Decryption Accountable

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authors

Colleges, School and Institutes

Abstract

Decryption is accountable if the users that create ciphertexts can gain information about the circumstances of the decryptions that are later obtained. We describe a protocol that forces decryptors to create such information. The information can’t be discarded or suppressed without detection. The protocol relies on a trusted hardware device. We describe some applications.

Details

Original languageEnglish
Title of host publicationSecurity Protocols XXV
Subtitle of host publication25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers
EditorsJonathan Anderson, Bruce Christianson, Vashek Matyas, Frank Stajano
Publication statusPublished - 2017
EventTwenty-fifth International Workshop on Security Protocols - Cambridge, United Kingdom
Duration: 20 Mar 201722 Mar 2017

Publication series

NameLecture Notes in Computer Science
PublisherSpringer
VolumeXXV (25)
ISSN (Print)0302-9743

Conference

ConferenceTwenty-fifth International Workshop on Security Protocols
CountryUnited Kingdom
CityCambridge
Period20/03/1722/03/17