Accountable Decryption
For decryptor: Using trusted hardware to force each decryption to generate publicly verifiable logs, ensuring accountability.
For trusted hardware: Inspecting the TEE's outputs, aiming to reduce the risk of the compromised TEE.
Detection
Allowing authorized parties to trace the decryption, thus ensuring that actions are conducted within specified guidelines.
Deterrent
Making the decryptors responsible for their actions, as any violation of the access control can be caught and punished.
Compliance
Helping decryptors demonstrate compliance with regulations by providing a verifiable record of decryption events.
Awareness
Reminding the decryptor of potential key leakage and prompting them to take measures to protect and update their decryption keys.