Making Decryption Accountable

Research output: Chapter in Book/Report/Conference proceedingConference contribution

270 Downloads (Pure)

Abstract

Decryption is accountable if the users that create ciphertexts can gain information about the circumstances of the decryptions that are later obtained. We describe a protocol that forces decryptors to create such information. The information can’t be discarded or suppressed without detection. The protocol relies on a trusted hardware device. We describe some applications.
Original languageEnglish
Title of host publicationSecurity Protocols XXV
Subtitle of host publication25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers
EditorsJonathan Anderson, Bruce Christianson, Vashek Matyas, Frank Stajano
PublisherSpringer
Pages93-98
Number of pages6
VolumeXXV
Edition1st
ISBN (Electronic)9783319710754
ISBN (Print)9783319710747
DOIs
Publication statusPublished - 2017
EventTwenty-fifth International Workshop on Security Protocols - Cambridge, United Kingdom
Duration: 20 Mar 201722 Mar 2017

Publication series

NameLecture Notes in Computer Science
PublisherSpringer
VolumeXXV (25)
ISSN (Print)0302-9743

Conference

ConferenceTwenty-fifth International Workshop on Security Protocols
Country/TerritoryUnited Kingdom
CityCambridge
Period20/03/1722/03/17

Fingerprint

Dive into the research topics of 'Making Decryption Accountable'. Together they form a unique fingerprint.

Cite this