@inproceedings{9f2ce09cba7d4e53b3bfd9a6e788be9b,
title = "Making Decryption Accountable",
abstract = "Decryption is accountable if the users that create ciphertexts can gain information about the circumstances of the decryptions that are later obtained. We describe a protocol that forces decryptors to create such information. The information can{\textquoteright}t be discarded or suppressed without detection. The protocol relies on a trusted hardware device. We describe some applications.",
author = "Ryan, {Mark D.}",
year = "2017",
doi = "10.1007/978-3-319-71075-4",
language = "English",
isbn = "9783319710747",
volume = "XXV",
series = "Lecture Notes in Computer Science",
publisher = "Springer",
pages = "93--98",
editor = "Jonathan Anderson and Bruce Christianson and Vashek Matyas and Frank Stajano",
booktitle = "Security Protocols XXV",
edition = "1st",
note = "Twenty-fifth International Workshop on Security Protocols ; Conference date: 20-03-2017 Through 22-03-2017",
}