5 research outputs found
DEcryption Contract ENforcement Tool (DECENT): A Practical Alternative to Government Decryption Backdoors
A cryptographic contract and enforcement technology would guarantee release of a data decryption key to an authorized party if and only if predetermined contract requirements are satisfied. Threshold secret sharing can be used to eliminate the need for access to the hidden key under normal circumstances. It can also eliminate the liability and burden normally carried by device manufacturers or service providers when they store the decryption keys of their customers. Blockchain technology provides a mechanism for a public audit trail of the creation and release of the hidden key. The use of peer-to-peer mix-net network overlay technology can be added to insure that the blockchain audit trail documents the release of the key even if an all-powerful entity forces actors to act under duress
Recommended from our members
Analysis of the Durability of Replicated Distributed Storage Systems
In this paper, we investigate the roles of replication vs. repair to
achieve durability in large-scale distributed storage systems. Specifically, we
address the fundamental questions: How does the lifetime of an object depend on
the degree of replication and rate of repair, and how is lifetime maximized
when there is a constraint on resources? In addition, in real systems, when a
node becomes unavailable, there is uncertainty whether this is temporary or
permanent; we analyze the use of timeouts as a mechanism to make this
determination. Finally, we explore the importance of memory in repair
mechanisms, and show that under certain cost conditions, memoryless systems,
which are inherently less complex, perform just as well.Pre-2018 CSE ID: CS2007-090