Abstract
We propose a public key infrastructure framework, inspired by modern distributed cryptocurrencies, that allows for tunable key escrow, where the availability of key escrow is only provided under strict conditions and enforced through cryptographic measures. We argue that any key escrow scheme designed for the global scale must be both inert—requiring considerable effort to recover a key—and public—everybody should be aware of all key recovery attempts. To this end, one of the contributions of this work is an abstract design of a proof-of-work scheme that demonstrates the ability to recover a private key for some generic public key scheme. Our framework represents a new direction for key escrow, seeking an acceptable compromise between the demands for control of cryptography on the Internet and the fundamental rights of privacy, which we seek to align by drawing parallels to the physical world.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Abelson, H., Anderson, R.J., Bellovin, S.M., Benaloh, J., Blaze, M., Diffie, W., Gilmore, J., Green, M., Landau, S., Neumann, P.G., Rivest, R.L., Schiller, J.I., Schneier, B., Specter, M.A., Weitzner, D.J.: Keys under doormats. Commun. ACM 58(10), 24–26 (2015)
Abelson, H., Anderson, R.J., Bellovin, S.M., Benaloh, J., Blaze, M., Diffie, W., Gilmore, J., Neumann, P.G., Rivest, R.L., Schiller, J.I., Schneier, B.: The risks of key recovery, key escrow, and trusted third-party encryption (1997)
Ateniese, G., Faonio, A., Magri, B., Medeiros, B.: Certified bitcoins. In: Boureanu, I., Owesarski, P., Vaudenay, S. (eds.) ACNS 2014. LNCS, vol. 8479, pp. 80–96. Springer, Cham (2014). doi:10.1007/978-3-319-07536-5_6
Bellare, M., Goldwasser, S.:. Verifiable partial key escrow. In: Richard Graveman et al. (ed) Proceedings of the 4th ACM Conference on Computer and Communications Security CCS 1997, pp. 78–91. ACM (1997)
Bellare, M., Rivest, R.L.: Translucent cryptography - an alternative to key escrow, and its implementation via fractional oblivious transfer. J. Cryptology 12(2), 117–139 (1999)
Blaze, M.: Oblivious key escrow. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 335–343. Springer, Heidelberg (1996). doi:10.1007/3-540-61996-8_50
Chaum, D., Javani, F., Kate, A., Krasnova, A., de Ruiter, J., Sherman, A.T.: cMix: Anonymization by high-performance scalable mixing. IACR Cryptology ePrint Archive, 2016:8 (2016)
Denning, D.E., Branstad, D.K.: A taxonomy for key escrow encryption systems. Commun. ACM 39(3), 34–40 (1996)
Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002). doi:10.1007/3-540-45748-8_24
Hack, M.: The implications of Apple’s battle with the FBI. Netw. Secur. 2016(7), 8–10 (2016)
The Intercept: The great SIM heist (2015). https://theintercept.com/2015/02/19/great-sim-heist
WIRED: Todd Lappin. Winning the crypto wars (1997). www.wired.com/1997/05/cyber-rights-10/
Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008). https://bitcoin.org/bitcoin.pdf
Ethereum Network: Ethereum: smart contract and decentralized application platform (2016). https://github.com/ethereum/wiki/wiki/White-Paper
President’s Review Group on Intelligence, Communications Technologies, Clarke, R.A., Morell, M.J., Stone, G.R., Sunstein, C.R., Swire, P.P.: Liberty, security in a changing world: report and recommendations of the president’s review group on intelligence and communications technologies (2013). http://www.whitehouse.gov/sites/default/files/docs/2013-12-12_rg_final_report.pdf
Bart Preneel: IACR distinguished lecture: the future of cryptography (2016). http://homes.esat.kuleuven.be/~preneel/preneel_iacr_dl_vienna2016.pdf
Ruoti, S., Andersen, J., Zappala, D., Seamons, K.E.: Why Johnny still, still can’t encrypt: evaluating the usability of a modern PGP client. CoRR (2015)
Whitten, A., Tygar, J.D.: Why johnny can’t encrypt: a usability evaluation of PGP 5.0. In: Treese, G.W. (ed) 8th USENIX. USENIX (1999)
Wilson, D., Ateniese, G.: From pretty good to great: enhancing PGP using bitcoin and the blockchain. In: Qiu, M., Xu, S., Yung, M., Zhang, H. (eds.) Network and System Security. LNCS, vol. 9408, pp. 368–375. Springer, Cham (2015). doi:10.1007/978-3-319-25645-0_25
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Boyd, C., Boyen, X., Carr, C., Haines, T. (2017). Key Recovery: Inert and Public. In: Phan, RW., Yung, M. (eds) Paradigms in Cryptology – Mycrypt 2016. Malicious and Exploratory Cryptology. Mycrypt 2016. Lecture Notes in Computer Science(), vol 10311. Springer, Cham. https://doi.org/10.1007/978-3-319-61273-7_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-61273-7_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-61272-0
Online ISBN: 978-3-319-61273-7
eBook Packages: Computer ScienceComputer Science (R0)