Cutting Private Key Backup Failures by 6 Orders of Magnitude | HackerNoon
Briefly

The article proposes two innovative methods for private key backup and recovery: indirect-escrow and indirect-permission. Unlike traditional approaches that give both possession and permission to either the owner or trustees, the new methods allow trustees to possess only permission, enhancing security by making it harder to compromise. The methods are backed by thorough security and reliability analysis, demonstrating a significant reduction in recovery failure rates. The authors argue that their techniques are critical for public-key authentication infrastructures and can be adapted for other types of secret management.
This work proposes indirect-escrow and indirect-permission methods for private key backup, enhancing both security and reliability while addressing key management challenges.
Our proposed approach enables trustees to have permission without possession, significantly improving security, reducing risks of unauthorized access and ensuring the owner's control.
Read at Hackernoon
[
|
]