Scalable Key - Escrow

نویسندگان

  • Ivan B. Damgård
  • Mads J. Jurik
  • Mads Jurik
چکیده

We propose a cryptosystem that has an inherent key escrow mechanism. This leads us to propose a session based public verifiable key escrow system that greatly improves the amount of key material the escrow servers has to keep in order to decrypt an encryption. In our scheme the servers will only have a single secret sharing, as opposed to a single key from every escrowed player. This is done while still having the properties: 1) public verifiable: the user proves to everyone that the encryption can indeed be escrowed, and 2) no secret leakage: no matter how many decryptions a law enforcement agency is presented, it will gain no more information on the users private key, than it couldn’t have calculated itself.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A scalable and efficient key escrow model for lawful interception of IDBC-based secure communication

1Korea Advanced Institute of Science and Technology (KAIST ), 119, Munjiro, Yuseong-gu, Daejeon 305-732, South Korea 2Khalifa University of Science, Technology and Research, P.O. Box 573, Sharjah, United Arab Emirates 3Convergence S/W Lab, DMC R&D Center, Samsung Electronics, Dong Suwon P.O. Box 105, Maetan-3dong, Suwon, 442-600, Korea 4Department of Computer Science and Engineering, Seoul Nati...

متن کامل

Two Classes of Robust Threshold Key Escrow Schemes

The definition of robust threshold key escrow scheme (RTKES) is proposed in this paper. Namely, in RTKES, malice escrow agency fail to obtain the system secret key or user’s secret key, even if the number of malice escrow agency is more than or equal to the value of threshold. Clearly, the problem of “user’s secret key completely depends on the trusted escrow agency” is solved if RTKES exists. ...

متن کامل

Equitability in Retroactive Data Confiscation versus Proactive Key Escrow

The British Regulations of Investigatory Powers (RIP) Act 2000 is one of the first modern bills for mandatory disclosure of protected data in a democratic country. In this paper we compare this bill from a technical point of view with the US key escrow proposal (EES) and its variants and then, more generally we compare the merits of key confiscation vs key escrow. A major problem with key escro...

متن کامل

Equitability in Retroactive Key Connscation versus Proactive Key Escrow

The British Regulations of Investigatory Powers (RIP) Act 2000 is one of the rst modern bills for mandatory disclosure of protected data in a democratic country. In this paper we compare this bill from a technical point of view with the US key escrow proposal (EES) and its variants and then, more generally we compare the merits of key connscation vs key escrow. A major problem with key escrow i...

متن کامل

Partial Key Escrow Monitoring Scheme

During (partial) key escrow, how to monitor a user safely and eeciently is a very important problem. This paper initially proposes a monitoring scheme of a typical partial key escrow scheme. In this scheme, the escrowed key of a user is not compromised even if the user has been monitored for many times.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003