Key recovery: Inert and public

Colin Boyd, Xavier Boyen, Christopher Carr*, Thomas Haines

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Citations (Scopus)

Abstract

We propose a public key infrastructure framework, inspired by modern distributed cryptocurrencies, that allows for tunable key escrow, where the availability of key escrow is only provided under strict conditions and enforced through cryptographic measures. We argue that any key escrow scheme designed for the global scale must be both inert— requiring considerable effort to recover a key—and public—everybody should be aware of all key recovery attempts. To this end, one of the contributions of this work is an abstract design of a proof-of-work scheme that demonstrates the ability to recover a private key for some generic public key scheme. Our framework represents a new direction for key escrow, seeking an acceptable compromise between the demands for control of cryptography on the Internet and the fundamental rights of privacy, which we seek to align by drawing parallels to the physical world.

Original languageEnglish
Title of host publicationParadigms in Cryptology – Mycrypt 2016
Subtitle of host publicationMalicious and Exploratory Cryptology - 2nd International Conference, Mycrypt 2016, Revised Selected Papers
EditorsRaphael C.-W. Phan, Moti Yung
PublisherSpringer Verlag
Pages111-126
Number of pages16
ISBN (Print)9783319612720
DOIs
Publication statusPublished - 2017
Externally publishedYes
Event2nd International Conference on Cryptology and Malicious Security, Mycrypt 2016 - Kuala Lumpur, Malaysia
Duration: 1 Dec 20162 Dec 2016

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume10311 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference2nd International Conference on Cryptology and Malicious Security, Mycrypt 2016
Country/TerritoryMalaysia
CityKuala Lumpur
Period1/12/162/12/16

Fingerprint

Dive into the research topics of 'Key recovery: Inert and public'. Together they form a unique fingerprint.

Cite this