Accountable Metadata-Hiding Escrow: A Group Signature Case Study
A common approach to demands for lawful access to encrypted data is to allow a trusted third party (TTP) to gain access to private data. However, there is no way to verify that this trust is well placed as the TTP may open all messages indiscriminately. Moreover, existing approaches do not scale wel...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Sciendo
2015-06-01
|
Series: | Proceedings on Privacy Enhancing Technologies |
Subjects: | |
Online Access: | http://www.degruyter.com/view/j/popets.2015.2015.issue-2/popets-2015-0012/popets-2015-0012.xml?format=INT |