Increasing Efficiency of International Key Escrow in Mutually Mistrusting Domains

نویسنده

  • Keith M. Martin
چکیده

This paper is concerned with key escrow protocols for use in international communications environments, where communication domains do not necessarily trust one another. It is concerned particularly with systems where users place their trust collectively with groups of trusted third parties. We consider two different protocols, discuss and improve their efficiency and generalise the type of key splitting.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Increasing Eeciency of International Key Escrow in Mutually Mistrusting Domains

This paper is concerned with key escrow protocols for use in international communications environments, where communication domains do not necessarily trust one another. It is concerned particularly with systems where users place their trust collectively with groups of trusted third parties. We consider two diierent protocols, discuss and improve their eeciency and generalise the type of key sp...

متن کامل

Key Escrow in Mutually Mistrusting Domains

In this paper we present a key escrow system which meets possible requirements for international key escrow, where diierent domains may not trust each other. In this system multiple third parties, who are trusted collectively but not individually, perform the dual role of providing users with key management services and providing autho-rised agencies in the relevant domains with warranted acces...

متن کامل

Toward Fair International Key Escrow

We consider key escrow system for international communication between multiple domains with different policies. In intercepting international communications between two domains serious problems on unfairness may arise when one government has not authorized the message interception in legal. We solve this problem by incorporating a mechanism that allows message interception by law enforcement pa...

متن کامل

Efficient Robust Private Set Intersection

Computing Set Intersection privately and efficiently between two mutually mistrusting parties is an important basic procedure in the area of private data mining. Assuring robustness, namely, coping with potentially arbitrarily misbehaving (i.e., malicious) parties, while retaining protocol efficiency (rather than employing costly generic techniques) is an open problem. In this work the first so...

متن کامل

Key Generation Protocol in IBC

Identity Based Cryptography (IBC) is well known method in the field of security, however it has an inherent drawback of Key Escrow under which central key generation center is a sole issuing authority of private key and thus could misuse it. Our survey finds numerous solutions of key escrow; out of them secure key issuing protocol (SKIP) is most prominent. However, there are scopes for improvin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997