Abstract
Key escrow cryptography has gained much attention in the last two years. A key escrow system can provide cryptographic protection to unclassified, sensitive data, while at the same time, allows for the decryption of encrypted messages when lawfully authorized.
In this paper we propose a protocol for supporting the implementation of key escrow systems in software. Our protocol is an improvement on two previous protocols proposed in [1].
Preview
Unable to display preview. Download preview PDF.
References
D.M.Balenson, C.M.Ellison, S.B.Lipner, and S.T.Walker, A new approach to software key escrow encryption, manuscript, 1994.
M.Blaze, Protocol failure in the escrowed encryption standard, Proceedings of the 2nd ACM Conference on Computer and Communications Security, 1994, pp.59–67.
J.He and E.Dawson, A new key escrow cryptosystem, in Cryptography: Policy and Algorithms, Springer-Verlag 1995, LNCS Vol.1029,pp.105–114.
Y.Desmedt, Securing traceability of ciphertexts — towards a secure software key escrow system, Advances in Cryptology, L.C.Guillon and V.Quisquater (editors), LNCS 921, Springer-Verlag 1995, pp.147–157.
L.Knudsen and T.Pedersen, On the difficulty of software key escrow, Advances in Cryptology: EUROCRYPT'96, Springer-Verlag 1996, LNCS 1070, pp.237–244.
S.Micali, Fair public-key cryptosystems, Advances in Cryptology: CRYPTO'92, Springer-Verlag 1993, LNCS 740, pp.113–138.
National Institute for Standards and Technology, The digital signature standard, Comm. ACM, Vol. 35, No.7, 1992, pp. 36–40.
National Institute for Standards and Technology, Escrowed Encryption Standard, Federal Information Processing Standards Publication 185, U.S. Dept. of Commerce, 1994.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1996 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Dawson, E., He, J. (1996). Another approach to software key escrow encryption. In: Pieprzyk, J., Seberry, J. (eds) Information Security and Privacy. ACISP 1996. Lecture Notes in Computer Science, vol 1172. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0023290
Download citation
DOI: https://doi.org/10.1007/BFb0023290
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-61991-8
Online ISBN: 978-3-540-49583-3
eBook Packages: Springer Book Archive