Skip to main content

Increasing efficiency of International key escrow in mutually mistrusting domains

  • Conference paper
  • First Online:
Crytography and Coding (Cryptography and Coding 1997)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1355))

Included in the following conference series:

Abstract

This paper is concerned with key escrow protocols for use in international communications environments, where communication domains do not necessarily trust one another. It is concerned particularly with systems where users place their trust collectively with groups of trusted third parties. We consider two different protocols, discuss and improve their efficiency and generalise the type of key splitting.

Supported by the European Commission under ACTS project AC095 (ASPeCT)

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. J. Benaloh. Secret sharing homomorphisms: keeping shares of a secret secret. Adv. in Cryptology-CRYPTO'86, Lecture Notes in Cornput. Sci, 263 (1987) 251–260.

    Google Scholar 

  2. G. R. Blakley. Safeguarding cryptographic keys. Proceedings of AFIPS 1979 National Computer Conference, 48 (1979) 313–317.

    Google Scholar 

  3. E. F. Brickell. Some ideal secret sharing schemes. J. Combin. Math. Combin. Comput., 9 (1989) 105–113.

    Google Scholar 

  4. L. Chen, D. Gollmann and C.J. Mitchell. Key escrow in mutually mistrusting domains. Proceedings of 1996 Cambridge Workshop on Security Protocols, Lecture Notes in Comput. Sci., 1189 (1997) 139–153.

    Google Scholar 

  5. D.E. Denning and D.K. Branstad. A taxonomy for key escrow encryption systems. Communications of the ACM, 39(3) (1996) 34–40.

    Article  Google Scholar 

  6. Y. G. Desmedt and Y. Frankel. Homomorphic zero-knowledge threshold schemes over any finite abelian group. SIAM J. Disc. Math., 4 (1994) 667–679.

    Article  Google Scholar 

  7. W. Diffie and M. Hellman. New directions in cryptography. IEEE Transactions on Information Theory, 22 (1976) 644–654.

    Article  Google Scholar 

  8. M. van Dijk, On the information rate of perfect secret sharing schemes, Des. Codes Cryptogr., 6 (1995) 143–169.

    Article  Google Scholar 

  9. Y. Frankel and Y. Desmedt. Classification of ideal homomorphic threshold schemes over finite Abelian groups. Adv. in Cryptology-EUROCRYPT'92, Lecture Notes in Comput. Sci., 658 (1992) 25–34.

    Google Scholar 

  10. I. Ingemarsson and G. J. Simmons. A protocol to set up shared secret schemes without the assistance of a mutually trusted party. Adv. in Cryptology-EUROCRYPT'90, Lecture Notes in Comput. Sci., 473 (1991) 266–282.

    Google Scholar 

  11. W.-A. Jackson, K.M. Martin and C.M. O'Keefe. Mutually Trusted Authority free Secret Sharing Schemes. J. Cryptology, to appear.

    Google Scholar 

  12. N. Jefferies, C. Mitchell and M. Walker. A proposed architecture for trusted third party services. Cryptography: Policy and Algorithms, Lecture Notes in Comput. Sci., 1029 (1996) 98–104.

    Google Scholar 

  13. N. Jefferies, C. Mitchell and M. Walker. Practical solutions to key escrow and regulatory aspects. Proceedings of Public Key Solutions '96, Zurich, September 1996.

    Google Scholar 

  14. S. Micali. Fair cryptosystems. MIT Technical Report, MIT/LCS/TR-579.c, (1994).

    Google Scholar 

  15. A. Shamir. How to share a secret. Comm. ACM, 22(11) (1979) 612–613.

    Article  Google Scholar 

  16. G. J. Simmons, W.-A. Jackson, and K. Martin. The geometry of shared secret schemes. Bull. Inst. Combin. Appl., 1 (1991) 71–88.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Michael Darnell

Rights and permissions

Reprints and permissions

Copyright information

© 1997 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Martin, K.M. (1997). Increasing efficiency of International key escrow in mutually mistrusting domains. In: Darnell, M. (eds) Crytography and Coding. Cryptography and Coding 1997. Lecture Notes in Computer Science, vol 1355. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0024467

Download citation

  • DOI: https://doi.org/10.1007/BFb0024467

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-63927-5

  • Online ISBN: 978-3-540-69668-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics