Increasing Efficiency of International Key Escrow in Mutually Mistrusting Domains
نویسنده
چکیده
This paper is concerned with key escrow protocols for use in international communications environments, where communication domains do not necessarily trust one another. It is concerned particularly with systems where users place their trust collectively with groups of trusted third parties. We consider two different protocols, discuss and improve their efficiency and generalise the type of key splitting.
منابع مشابه
Increasing Eeciency of International Key Escrow in Mutually Mistrusting Domains
This paper is concerned with key escrow protocols for use in international communications environments, where communication domains do not necessarily trust one another. It is concerned particularly with systems where users place their trust collectively with groups of trusted third parties. We consider two diierent protocols, discuss and improve their eeciency and generalise the type of key sp...
متن کاملKey Escrow in Mutually Mistrusting Domains
In this paper we present a key escrow system which meets possible requirements for international key escrow, where diierent domains may not trust each other. In this system multiple third parties, who are trusted collectively but not individually, perform the dual role of providing users with key management services and providing autho-rised agencies in the relevant domains with warranted acces...
متن کاملToward Fair International Key Escrow
We consider key escrow system for international communication between multiple domains with different policies. In intercepting international communications between two domains serious problems on unfairness may arise when one government has not authorized the message interception in legal. We solve this problem by incorporating a mechanism that allows message interception by law enforcement pa...
متن کاملEfficient Robust Private Set Intersection
Computing Set Intersection privately and efficiently between two mutually mistrusting parties is an important basic procedure in the area of private data mining. Assuring robustness, namely, coping with potentially arbitrarily misbehaving (i.e., malicious) parties, while retaining protocol efficiency (rather than employing costly generic techniques) is an open problem. In this work the first so...
متن کاملKey Generation Protocol in IBC
Identity Based Cryptography (IBC) is well known method in the field of security, however it has an inherent drawback of Key Escrow under which central key generation center is a sole issuing authority of private key and thus could misuse it. Our survey finds numerous solutions of key escrow; out of them secure key issuing protocol (SKIP) is most prominent. However, there are scopes for improvin...
متن کامل