Skip to main content
Log in

Key recovery for the commercial environment

  • Regular contribution
  • Published:
International Journal of Information Security Aims and scope Submit manuscript

Abstract.

We propose an efficient, scalable, certification-based key recovery system that is a hybrid of the key escrow and key encapsulation techniques. The proposed key recovery system is highly flexible and can be employed in a variety of policy environments. It possesses the properties required for commercial key recovery systems. We demonstrate the claims by comparing the computation and communication requirements for our proposal with a key recovery solution implemented by IBM.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

Author information

Authors and Affiliations

Authors

Additional information

Published online: 27 June 2002

Parts of this paper have already been published by the authors [23].

Rights and permissions

Reprints and permissions

About this article

Cite this article

Gonzáles Nieto, J., Viswanathan, K., Boyd, C. et al. Key recovery for the commercial environment . IJIS 1, 161–174 (2002). https://doi.org/10.1007/s10207-002-0014-0

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10207-002-0014-0

Navigation