Vis enkel innførsel

dc.contributor.authorBoyd, Colin Alexander
dc.contributor.authorBoyen, Xavier
dc.contributor.authorCarr, Christopher
dc.contributor.authorHaines, Thomas
dc.date.accessioned2018-05-03T06:48:57Z
dc.date.available2018-05-03T06:48:57Z
dc.date.created2017-11-26T20:48:26Z
dc.date.issued2017
dc.identifier.citationLecture Notes in Computer Science. 2017, 10311 LNCS 111-126.nb_NO
dc.identifier.issn0302-9743
dc.identifier.urihttp://hdl.handle.net/11250/2496873
dc.description.abstractWe propose a public key infrastructure framework, inspired by modern distributed cryptocurrencies, that allows for tunable key escrow, where the availability of key escrow is only provided under strict conditions and enforced through cryptographic measures. We argue that any key escrow scheme designed for the global scale must be both inert—requiring considerable effort to recover a key—and public—everybody should be aware of all key recovery attempts. To this end, one of the contributions of this work is an abstract design of a proof-of-work scheme that demonstrates the ability to recover a private key for some generic public key scheme. Our framework represents a new direction for key escrow, seeking an acceptable compromise between the demands for control of cryptography on the Internet and the fundamental rights of privacy, which we seek to align by drawing parallels to the physical world.nb_NO
dc.language.isoengnb_NO
dc.publisherSpringer Verlagnb_NO
dc.titleKey recovery: Inert and publicnb_NO
dc.typeJournal articlenb_NO
dc.typePeer reviewednb_NO
dc.description.versionacceptedVersionnb_NO
dc.source.pagenumber111-126nb_NO
dc.source.volume10311 LNCSnb_NO
dc.source.journalLecture Notes in Computer Sciencenb_NO
dc.identifier.doi10.1007/978-3-319-61273-7_6
dc.identifier.cristin1518551
dc.description.localcodeThis is a post-peer-review, pre-copyedit version of an article published in [Lecture Notes in Computer Science] Locked until 14.7.2018 due to copyright restrictions. The final authenticated version is available online at: https://doi.org/10.1007/978-3-319-61273-7_6nb_NO
cristin.unitcode194,63,30,0
cristin.unitnameInstitutt for informasjonssikkerhet og kommunikasjonsteknologi
cristin.ispublishedtrue
cristin.fulltextpostprint
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel