An authenticated and secure accounting system for international emissions trading

Expanding multi-country emissions trading system is considered as crucial to fill the existing mitigation gap for the 2\degree C climate target. Trustworthy emissions accounting is the cornerstone of such a system encompassing different jurisdictions. However, traditional emissions measuring, reporting, and verification practices that support data authenticity might not be applicable as detailed data from large utilities and production facilities to be covered in the multi-country emissions trading system are usually highly sensitive and of severe national security concern. In this study, we propose a cryptographic framework for an authenticated and secure emissions accounting system that can resolve this data dilemma. We demonstrate that integrating a sequence of cryptographic protocols can preserve data authenticity and security for a stylized multi-country emissions trading system. We call for more research to promote applications of modern cryptography in future international climate governance to build trust and strengthen collaboration.

[1]  Torben P. Pedersen Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.

[2]  Boaz Barak,et al.  A zero-knowledge protocol for nuclear warhead verification , 2014, Nature.

[3]  Helger Lipmaa,et al.  On Diophantine Complexity and Statistical Zero-Knowledge Arguments , 2003, ASIACRYPT.

[4]  Kazumaro Aoki,et al.  SEC X.2: Recommended Elliptic Curve Domain Parameters , 2008 .

[5]  Patrick Bayer,et al.  The European Union Emissions Trading System reduced CO2 emissions despite low prices , 2020, Proceedings of the National Academy of Sciences.

[6]  Johannes Merkle,et al.  Elliptic Curve Cryptography (ecc) Brainpool Standard Curves and Curve Generation , 2010 .

[7]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[8]  Valerie J. Karplus,et al.  Integrity of firms’ emissions reporting in China’s early carbon markets , 2019, Nature Climate Change.

[9]  Andrew Chi-Chih Yao,et al.  Theory and application of trapdoor functions , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).

[10]  S. Rajsbaum Foundations of Cryptography , 2014 .

[11]  Yehuda Lindell,et al.  Introduction to Modern Cryptography , 2004 .

[12]  E. Duflo,et al.  Truth-Telling by Third-Party Auditors and the Response of Polluting Firms: Experimental Evidence from India , 2013 .

[13]  Ivan Damgård,et al.  Commitment Schemes and Zero-Knowledge Protocols , 1998, Lectures on Data Security.

[14]  Nicholas Ryan,et al.  The Value of Regulatory Discretion: Estimates from Environmental Inspections in India , 2014 .

[15]  Silvio Micali,et al.  Probabilistic Encryption , 1984, J. Comput. Syst. Sci..

[16]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[17]  Manuel Blum,et al.  Coin flipping by telephone a protocol for solving impossible problems , 1983, SIGA.

[18]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[19]  Dan Boneh,et al.  Bulletproofs: Short Proofs for Confidential Transactions and More , 2018, 2018 IEEE Symposium on Security and Privacy (SP).

[20]  Silvio Micali,et al.  Non-Interactive Zero-Knowledge Proof Systems , 1987, CRYPTO.