Encrypted Key Recovery via Social Trust Models | HackerNoon
Briefly

The article discusses a novel approach for securely backing up private keys by incorporating social authentication methods. By selectively choosing trustees from a user's contacts to assist in the recovery process, the proposed algorithms aim to enhance both the security and reliability of key retrieval against potential adversaries. The article elaborates on the cryptographic definitions and notations for efficient communication of security objectives, followed by a rigorous quantitative analysis that compares this method with existing approaches, ultimately aiming to present lower recovery failure rates and optimized failure rate scenarios for key backups.
The proposed backup method incorporates the roles of chosen trustees who assist in recovering the owner's private key, enhancing the security against adversarial threats.
Our analysis reveals a structured evaluation of security and reliability measures which compares our algorithm's efficacy against other prevalent approaches in authentication.
Read at Hackernoon
[
|
]