Abstract
This paper explains why protection mechanisms which distribute even the protected forms of information assets lead to increased risks. It describes a mechanism (called a ”lethal secret sharing system”) which enables the imposition of ”forgetfulness” by an asset owner on the receiver of a protected asset. This forgetfulness, or ”lethe”, is enforced by allowing the asset owner to give information about a piece of knowledge to the asset receiver in such a way that the receiver can be prevented at a future time from using the knowledge to recover the information.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Blakley, B., Blakley, G.R.: All Sail, No Anchor I: Cryptography, Risk, and e- Commerce. In: Clark, A., Boyd, C., Dawson, E. (eds.) ACISP 2000. LNCS, vol. 1841, pp. 471–476. Springer, Heidelberg (2000)
Blakley, G.R.: Safeguarding Cryptographic Keys. In: Proceedings of the National Computer Conference, American Federation of Information Processing Societies Press, June 1979, vol. 48, pp. 242–268 (1979)
Blakley, G.R., Meadows, C.: Security of Ramp Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 242–268. Springer, Heidelberg (1985)
FitzGerald, Edward, tr.: The Rubaiyat of Omar Khayyam. In: Decker, C. (ed.) Bibliographical Society of the University of Virginia (1997)
Shamir, A.: How to Share a Secret. Communications of the ACM 24(11), 612–613 (1979)
Virgil: “Opera”. In: Mynors, R.A.B. (ed.) Aeneid 6.705. Oxford University Press, Oxford (1969)
Von Neumann, J., Morgenstern, O.: Theory of Games and Economic Behavior. Princeton University Press, Princeton (1953)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Blakley, B., Blakley, G.R. (2005). All Sail, No Anchor III: Risk Aggregation and Time’s Arrow. In: Boyd, C., González Nieto, J.M. (eds) Information Security and Privacy. ACISP 2005. Lecture Notes in Computer Science, vol 3574. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11506157_1
Download citation
DOI: https://doi.org/10.1007/11506157_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-26547-4
Online ISBN: 978-3-540-31684-8
eBook Packages: Computer ScienceComputer Science (R0)