A Cryptographic Escrow for Treaty Declarations and Step-by-Step Verification

09/11/2018
by   Sébastien Philippe, et al.
0

The verification of arms-control and disarmament agreements requires states to provide declarations, including information on sensitive military sites and assets. There are important cases, however, where negotiations of these agreements are impeded because states are reluctant to provide any such data, because of concerns about prematurely handing over militarily significant information. To address this challenge, we present a cryptographic escrow that allows a state to make a complete declaration of sites and assets at the outset and commit to its content, but only reveal the sensitive information therein sequentially. Combined with an inspection regime, our escrow allows for step-by-step verification of the correctness and completeness of the initial declaration so that the information release and inspections keep pace with parallel diplomatic and political processes. We apply this approach to the possible denuclearization of North Korea. Such approach can be applied, however, to any agreement requiring the sharing of sensitive information.

READ FULL TEXT
research
12/22/2018

Physical Cryptographic Signatures for Absentee Ballots

Physical signature verification on absentee ballots became a major flash...
research
04/08/2023

Nuclear Arms Control Verification and Lessons for AI Treaties

Security risks from AI have motivated calls for international agreements...
research
07/10/2020

Mechanisms for Hiding Sensitive Genotypes with Information-Theoretic Privacy

The growing availability of personal genomics services comes with increa...
research
12/01/2020

Bayesian classification for dating archaeological sites via projectile points

Dating is a key element for archaeologists. We propose a Bayesian approa...
research
09/24/2021

A Parallel Tempering Approach for Efficient Exploration of the Verification Tradespace in Engineered Systems

Verification is a critical process in the development of engineered syst...
research
11/24/2020

New method of verifying cryptographic protocols based on the process model

A cryptographic protocol (CP) is a distributed algorithm designed to pro...
research
05/26/2023

Automated Verification of Correctness for Masked Arithmetic Programs

Masking is a widely-used effective countermeasure against power side-cha...

Please sign up or login with your details

Forgot password? Click here to reset