Scalable Key-Escrow
نویسندگان
چکیده
منابع مشابه
Scalable Key - Escrow
We propose a cryptosystem that has an inherent key escrow mechanism. This leads us to propose a session based public verifiable key escrow system that greatly improves the amount of key material the escrow servers has to keep in order to decrypt an encryption. In our scheme the servers will only have a single secret sharing, as opposed to a single key from every escrowed player. This is done wh...
متن کاملDemocratic Key Escrow Scheme
Cryptography is a dual-edged sword. On the one hand, it allows secure electronic communications by legitimate users. On the other hand, it can be used by criminals to thwart law enforcement efforts and by foreign countries to prevent security agencies from gathering intelligence information about these countries. However, the widespread use of cryptography is critical to the establishment of th...
متن کاملProvable Partial Key Escrow
In this paper we first propose two new concepts concerning the notion of key escrow schemes: provable partiality and independence. Roughly speaking, a scheme has provable partiality if the existence of a polynomial time for recovering the secret from escrowed information implies there is a polynomial time algorithm for solving a well known intractable problem. A scheme is independent if the sec...
متن کاملToward Fair International Key Escrow
We consider key escrow system for international communication between multiple domains with different policies. In intercepting international communications between two domains serious problems on unfairness may arise when one government has not authorized the message interception in legal. We solve this problem by incorporating a mechanism that allows message interception by law enforcement pa...
متن کاملPartial Key Escrow Monitoring Scheme
During (partial) key escrow, how to monitor a user safely and eeciently is a very important problem. This paper initially proposes a monitoring scheme of a typical partial key escrow scheme. In this scheme, the escrowed key of a user is not compromised even if the user has been monitored for many times.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: BRICS Report Series
سال: 2003
ISSN: 1601-5355,0909-0878
DOI: 10.7146/brics.v10i22.21792