Skip to main content

Another approach to software key escrow encryption

  • Session 3: Encryption and Cryptographic Functions
  • Conference paper
  • First Online:
Information Security and Privacy (ACISP 1996)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1172))

Included in the following conference series:

Abstract

Key escrow cryptography has gained much attention in the last two years. A key escrow system can provide cryptographic protection to unclassified, sensitive data, while at the same time, allows for the decryption of encrypted messages when lawfully authorized.

In this paper we propose a protocol for supporting the implementation of key escrow systems in software. Our protocol is an improvement on two previous protocols proposed in [1].

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. D.M.Balenson, C.M.Ellison, S.B.Lipner, and S.T.Walker, A new approach to software key escrow encryption, manuscript, 1994.

    Google Scholar 

  2. M.Blaze, Protocol failure in the escrowed encryption standard, Proceedings of the 2nd ACM Conference on Computer and Communications Security, 1994, pp.59–67.

    Google Scholar 

  3. J.He and E.Dawson, A new key escrow cryptosystem, in Cryptography: Policy and Algorithms, Springer-Verlag 1995, LNCS Vol.1029,pp.105–114.

    Google Scholar 

  4. Y.Desmedt, Securing traceability of ciphertexts — towards a secure software key escrow system, Advances in Cryptology, L.C.Guillon and V.Quisquater (editors), LNCS 921, Springer-Verlag 1995, pp.147–157.

    Google Scholar 

  5. L.Knudsen and T.Pedersen, On the difficulty of software key escrow, Advances in Cryptology: EUROCRYPT'96, Springer-Verlag 1996, LNCS 1070, pp.237–244.

    Google Scholar 

  6. S.Micali, Fair public-key cryptosystems, Advances in Cryptology: CRYPTO'92, Springer-Verlag 1993, LNCS 740, pp.113–138.

    Google Scholar 

  7. National Institute for Standards and Technology, The digital signature standard, Comm. ACM, Vol. 35, No.7, 1992, pp. 36–40.

    Google Scholar 

  8. National Institute for Standards and Technology, Escrowed Encryption Standard, Federal Information Processing Standards Publication 185, U.S. Dept. of Commerce, 1994.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Josef Pieprzyk Jennifer Seberry

Rights and permissions

Reprints and permissions

Copyright information

© 1996 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Dawson, E., He, J. (1996). Another approach to software key escrow encryption. In: Pieprzyk, J., Seberry, J. (eds) Information Security and Privacy. ACISP 1996. Lecture Notes in Computer Science, vol 1172. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0023290

Download citation

  • DOI: https://doi.org/10.1007/BFb0023290

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-61991-8

  • Online ISBN: 978-3-540-49583-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics