Self-Escrowed Public-Key Infrastructures

نویسندگان

  • Pascal Paillier
  • Moti Yung
چکیده

This paper introduces a cryptographic paradigm called selfescrowed encryption, a concept initiated by kleptography. In simple words, a self-escrowed public-key cryptosystem features the property that the scheme’s public and private keys are connected to each other by the mean of an other cryptosystem, called the master scheme. We apply this notion to the design of auto-recoverable autocertifiable cryptosystems, a solution to software key escrow due to Young and Yung, and provide a new cryptographic escrow system called selfescrowed public key infrastructure. In addition, we give an example of such a system based on ElGamal and Paillier encryption schemes which achieves a high level of both efficiency and security.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

RSA-Based Auto-recoverable Cryptosystems

The deployment of a “public-key infrastructure” (PKI) has recently started. Another recent concern in business and on the national level is the issue of escrowed encryption, key recovery, and emergency access to information (e.g., in the medical record area). Independent development of a PKI and an escrowed PKI (whenever required or desired) will pose a lot of constraints, duplication efforts a...

متن کامل

Scalable Key - Escrow

We propose a cryptosystem that has an inherent key escrow mechanism. This leads us to propose a session based public verifiable key escrow system that greatly improves the amount of key material the escrow servers has to keep in order to decrypt an encryption. In our scheme the servers will only have a single secret sharing, as opposed to a single key from every escrowed player. This is done wh...

متن کامل

Identity Escrow

We introduce the concept of escrowed identity, an application of key-escrow ideas to the problem of authentication. In escrowed identity , one party A does not give his identity to another party B, but rather gives him information that would allow an authorized third party E to determine A's identity. However, B receives a guarantee that E can indeed determine A's identity. We consider a number...

متن کامل

Veriiable Escrowed Signature

We combine a publicly veriiable encryption technique and a Schnorr type signature scheme to achieve a veriiable escrowed signature scheme. The scheme allows a signer to convince a veriier the validity of a signature without letting him see the signature value. The unavailable but veriiable signature is encrypted under a public key of someone (e.g., a trusted third party) who stays oo-line. The ...

متن کامل

Abuses of Ajtai-Dwork Cryptosystem

Ajtai and Dwork 2] have recently introduced a probabilistic public-key en-cryption scheme which is secure under the assumption that a certain computational problem on lattices is hard on the worst-case. Their encryption method may cause decrytion errors, though with small probability. Goldre-ich, Goldwasser, and Halevi 7] later modiied the encryption method of Ajtai and Dwork and made Ajtai-Dwo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999