<?xml version="1.0" encoding="UTF-8"?>
<reference anchor="I-D.mcmillion-key-transparency" target="https://datatracker.ietf.org/doc/html/draft-mcmillion-key-transparency-00">
   <front>
      <title>Key Transparency</title>
      <author initials="B." surname="McMillion" fullname="Brendan McMillion">
         </author>
      <date month="March" day="6" year="2023" />
      <abstract>
	 <t>   While there are several established protocols for end-to-end
   encryption, relatively little attention has been given to securely
   distributing the end-user public keys for such encryption.  As a
   result, these protocols are often still vulnerable to eavesdropping
   by active attackers.  Key Transparency is a protocol for distributing
   sensitive cryptographic information, such as public keys, in a way
   that reliably either prevents interference or detects that it
   occurred in a timely manner.  In addition to distributing public
   keys, it can also be applied to ensure that a group of users agree on
   a shared value or to keep tamper-evident logs of security-critical
   events.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-mcmillion-key-transparency-00" />
   
</reference>
