Skip to main content

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10311))

Included in the following conference series:

Abstract

We propose a public key infrastructure framework, inspired by modern distributed cryptocurrencies, that allows for tunable key escrow, where the availability of key escrow is only provided under strict conditions and enforced through cryptographic measures. We argue that any key escrow scheme designed for the global scale must be both inert—requiring considerable effort to recover a key—and public—everybody should be aware of all key recovery attempts. To this end, one of the contributions of this work is an abstract design of a proof-of-work scheme that demonstrates the ability to recover a private key for some generic public key scheme. Our framework represents a new direction for key escrow, seeking an acceptable compromise between the demands for control of cryptography on the Internet and the fundamental rights of privacy, which we seek to align by drawing parallels to the physical world.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Unpublished, but widely attributed [4, 8].

References

  1. Abelson, H., Anderson, R.J., Bellovin, S.M., Benaloh, J., Blaze, M., Diffie, W., Gilmore, J., Green, M., Landau, S., Neumann, P.G., Rivest, R.L., Schiller, J.I., Schneier, B., Specter, M.A., Weitzner, D.J.: Keys under doormats. Commun. ACM 58(10), 24–26 (2015)

    Article  Google Scholar 

  2. Abelson, H., Anderson, R.J., Bellovin, S.M., Benaloh, J., Blaze, M., Diffie, W., Gilmore, J., Neumann, P.G., Rivest, R.L., Schiller, J.I., Schneier, B.: The risks of key recovery, key escrow, and trusted third-party encryption (1997)

    Google Scholar 

  3. Ateniese, G., Faonio, A., Magri, B., Medeiros, B.: Certified bitcoins. In: Boureanu, I., Owesarski, P., Vaudenay, S. (eds.) ACNS 2014. LNCS, vol. 8479, pp. 80–96. Springer, Cham (2014). doi:10.1007/978-3-319-07536-5_6

    Google Scholar 

  4. Bellare, M., Goldwasser, S.:. Verifiable partial key escrow. In: Richard Graveman et al. (ed) Proceedings of the 4th ACM Conference on Computer and Communications Security CCS 1997, pp. 78–91. ACM (1997)

    Google Scholar 

  5. Bellare, M., Rivest, R.L.: Translucent cryptography - an alternative to key escrow, and its implementation via fractional oblivious transfer. J. Cryptology 12(2), 117–139 (1999)

    Article  MATH  Google Scholar 

  6. Blaze, M.: Oblivious key escrow. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 335–343. Springer, Heidelberg (1996). doi:10.1007/3-540-61996-8_50

    Chapter  Google Scholar 

  7. Chaum, D., Javani, F., Kate, A., Krasnova, A., de Ruiter, J., Sherman, A.T.: cMix: Anonymization by high-performance scalable mixing. IACR Cryptology ePrint Archive, 2016:8 (2016)

    Google Scholar 

  8. Denning, D.E., Branstad, D.K.: A taxonomy for key escrow encryption systems. Commun. ACM 39(3), 34–40 (1996)

    Article  Google Scholar 

  9. Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002). doi:10.1007/3-540-45748-8_24

    Chapter  Google Scholar 

  10. Hack, M.: The implications of Apple’s battle with the FBI. Netw. Secur. 2016(7), 8–10 (2016)

    Article  Google Scholar 

  11. The Intercept: The great SIM heist (2015). https://theintercept.com/2015/02/19/great-sim-heist

  12. WIRED: Todd Lappin. Winning the crypto wars (1997). www.wired.com/1997/05/cyber-rights-10/

  13. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008). https://bitcoin.org/bitcoin.pdf

  14. Ethereum Network: Ethereum: smart contract and decentralized application platform (2016). https://github.com/ethereum/wiki/wiki/White-Paper

  15. President’s Review Group on Intelligence, Communications Technologies, Clarke, R.A., Morell, M.J., Stone, G.R., Sunstein, C.R., Swire, P.P.: Liberty, security in a changing world: report and recommendations of the president’s review group on intelligence and communications technologies (2013). http://www.whitehouse.gov/sites/default/files/docs/2013-12-12_rg_final_report.pdf

  16. Bart Preneel: IACR distinguished lecture: the future of cryptography (2016). http://homes.esat.kuleuven.be/~preneel/preneel_iacr_dl_vienna2016.pdf

  17. Ruoti, S., Andersen, J., Zappala, D., Seamons, K.E.: Why Johnny still, still can’t encrypt: evaluating the usability of a modern PGP client. CoRR (2015)

    Google Scholar 

  18. Whitten, A., Tygar, J.D.: Why johnny can’t encrypt: a usability evaluation of PGP 5.0. In: Treese, G.W. (ed) 8th USENIX. USENIX (1999)

    Google Scholar 

  19. Wilson, D., Ateniese, G.: From pretty good to great: enhancing PGP using bitcoin and the blockchain. In: Qiu, M., Xu, S., Yung, M., Zhang, H. (eds.) Network and System Security. LNCS, vol. 9408, pp. 368–375. Springer, Cham (2015). doi:10.1007/978-3-319-25645-0_25

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Christopher Carr .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Boyd, C., Boyen, X., Carr, C., Haines, T. (2017). Key Recovery: Inert and Public. In: Phan, RW., Yung, M. (eds) Paradigms in Cryptology – Mycrypt 2016. Malicious and Exploratory Cryptology. Mycrypt 2016. Lecture Notes in Computer Science(), vol 10311. Springer, Cham. https://doi.org/10.1007/978-3-319-61273-7_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-61273-7_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-61272-0

  • Online ISBN: 978-3-319-61273-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics