Scalable Key - Escrow
نویسندگان
چکیده
We propose a cryptosystem that has an inherent key escrow mechanism. This leads us to propose a session based public verifiable key escrow system that greatly improves the amount of key material the escrow servers has to keep in order to decrypt an encryption. In our scheme the servers will only have a single secret sharing, as opposed to a single key from every escrowed player. This is done while still having the properties: 1) public verifiable: the user proves to everyone that the encryption can indeed be escrowed, and 2) no secret leakage: no matter how many decryptions a law enforcement agency is presented, it will gain no more information on the users private key, than it couldn’t have calculated itself.
منابع مشابه
A scalable and efficient key escrow model for lawful interception of IDBC-based secure communication
1Korea Advanced Institute of Science and Technology (KAIST ), 119, Munjiro, Yuseong-gu, Daejeon 305-732, South Korea 2Khalifa University of Science, Technology and Research, P.O. Box 573, Sharjah, United Arab Emirates 3Convergence S/W Lab, DMC R&D Center, Samsung Electronics, Dong Suwon P.O. Box 105, Maetan-3dong, Suwon, 442-600, Korea 4Department of Computer Science and Engineering, Seoul Nati...
متن کاملTwo Classes of Robust Threshold Key Escrow Schemes
The definition of robust threshold key escrow scheme (RTKES) is proposed in this paper. Namely, in RTKES, malice escrow agency fail to obtain the system secret key or user’s secret key, even if the number of malice escrow agency is more than or equal to the value of threshold. Clearly, the problem of “user’s secret key completely depends on the trusted escrow agency” is solved if RTKES exists. ...
متن کاملEquitability in Retroactive Data Confiscation versus Proactive Key Escrow
The British Regulations of Investigatory Powers (RIP) Act 2000 is one of the first modern bills for mandatory disclosure of protected data in a democratic country. In this paper we compare this bill from a technical point of view with the US key escrow proposal (EES) and its variants and then, more generally we compare the merits of key confiscation vs key escrow. A major problem with key escro...
متن کاملEquitability in Retroactive Key Connscation versus Proactive Key Escrow
The British Regulations of Investigatory Powers (RIP) Act 2000 is one of the rst modern bills for mandatory disclosure of protected data in a democratic country. In this paper we compare this bill from a technical point of view with the US key escrow proposal (EES) and its variants and then, more generally we compare the merits of key connscation vs key escrow. A major problem with key escrow i...
متن کاملPartial Key Escrow Monitoring Scheme
During (partial) key escrow, how to monitor a user safely and eeciently is a very important problem. This paper initially proposes a monitoring scheme of a typical partial key escrow scheme. In this scheme, the escrowed key of a user is not compromised even if the user has been monitored for many times.
متن کامل