dc.contributor.author | Boyd, Colin Alexander | |
dc.contributor.author | Boyen, Xavier | |
dc.contributor.author | Carr, Christopher | |
dc.contributor.author | Haines, Thomas | |
dc.date.accessioned | 2018-05-03T06:48:57Z | |
dc.date.available | 2018-05-03T06:48:57Z | |
dc.date.created | 2017-11-26T20:48:26Z | |
dc.date.issued | 2017 | |
dc.identifier.citation | Lecture Notes in Computer Science. 2017, 10311 LNCS 111-126. | nb_NO |
dc.identifier.issn | 0302-9743 | |
dc.identifier.uri | http://hdl.handle.net/11250/2496873 | |
dc.description.abstract | We propose a public key infrastructure framework, inspired by modern distributed cryptocurrencies, that allows for tunable key escrow, where the availability of key escrow is only provided under strict conditions and enforced through cryptographic measures. We argue that any key escrow scheme designed for the global scale must be both inert—requiring considerable effort to recover a key—and public—everybody should be aware of all key recovery attempts. To this end, one of the contributions of this work is an abstract design of a proof-of-work scheme that demonstrates the ability to recover a private key for some generic public key scheme. Our framework represents a new direction for key escrow, seeking an acceptable compromise between the demands for control of cryptography on the Internet and the fundamental rights of privacy, which we seek to align by drawing parallels to the physical world. | nb_NO |
dc.language.iso | eng | nb_NO |
dc.publisher | Springer Verlag | nb_NO |
dc.title | Key recovery: Inert and public | nb_NO |
dc.type | Journal article | nb_NO |
dc.type | Peer reviewed | nb_NO |
dc.description.version | acceptedVersion | nb_NO |
dc.source.pagenumber | 111-126 | nb_NO |
dc.source.volume | 10311 LNCS | nb_NO |
dc.source.journal | Lecture Notes in Computer Science | nb_NO |
dc.identifier.doi | 10.1007/978-3-319-61273-7_6 | |
dc.identifier.cristin | 1518551 | |
dc.description.localcode | This is a post-peer-review, pre-copyedit version of an article published in [Lecture Notes in Computer Science] Locked until 14.7.2018 due to copyright restrictions. The final authenticated version is available online at: https://doi.org/10.1007/978-3-319-61273-7_6 | nb_NO |
cristin.unitcode | 194,63,30,0 | |
cristin.unitname | Institutt for informasjonssikkerhet og kommunikasjonsteknologi | |
cristin.ispublished | true | |
cristin.fulltext | postprint | |
cristin.qualitycode | 1 | |