Another approach to software key escrow encryption

被引:0
|
作者
Dawson, E [1 ]
He, JM [1 ]
机构
[1] Queensland Univ Technol, Informat Secur Res Ctr, Brisbane, Qld 4001, Australia
关键词
key escrow; law enforcement; wiretapping; public key;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Key escrow cryptography has gained much attention in the last two years. A key escrow system can provide cryptographic protection to unclassified, sensitive data, while at the same time, allows for the decryption of encrypted messages when lawfully authorized. In this paper we propose a protocol for supporting the implementation of key escrow systems in software. Our protocol is an improvement on two previous protocols proposed in [1].
引用
收藏
页码:87 / 95
页数:9
相关论文
共 50 条
  • [1] Key escrow encryption: the third paradigm
    Denning, Dorothy E.
    Computer Security Journal, 11 (01): : 43 - 52
  • [2] A taxonomy for key escrow encryption systems
    Denning, DE
    Branstad, DK
    COMMUNICATIONS OF THE ACM, 1996, 39 (03) : 34 - 39
  • [3] On the difficulty of software key escrow
    Knudsen, LR
    Pedersen, TP
    ADVANCES IN CRYPTOLOGY - EUROCRYPT '96, 1996, 1070 : 237 - 244
  • [4] SOFTWARE-KEY ESCROW EMERGES
    WAYNER, P
    BYTE, 1994, 19 (10): : 40 - 40
  • [5] THE UNITED-STATES KEY ESCROW ENCRYPTION TECHNOLOGY
    DENNING, DE
    COMPUTER COMMUNICATIONS, 1994, 17 (07) : 453 - 457
  • [6] Mitigating key escrow in attribute-based encryption
    Wang, Yongtao
    Liu, Xiaonan
    Liang, Lulu
    Feng, Weiduan
    Yang, Guang
    International Journal of Network Security, 2015, 17 (01) : 94 - 102
  • [7] IKE: Threshold Key Escrow Service with Intermediary Encryption
    Yang, Yang
    Li, Bingyu
    Xiong, Shihong
    Qin, Bo
    Zhu, Yan
    Zheng, Haibin
    Wu, Qianhong
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2023, PT III, 2024, 14489 : 463 - 475
  • [8] Research on key escrow technology Based on software
    Yu, Zhengli
    2018 INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION SCIENCE AND APPLICATION TECHNOLOGY, 2019, 1168
  • [9] Remove key escrow from the Identity-Based Encryption system
    Cheng, ZH
    Comley, R
    Vasiu, L
    EXPLORING NEW FRONTIERS OF THEORETICAL INFORMATICS, 2004, 155 : 37 - 50
  • [10] Identity-Based Encryption on RSA Without Pairings and Key Escrow
    ZHU Yan
    WANG Shanbiao
    MA Di
    FENG Rongquan
    Chinese Journal of Electronics, 2014, 23 (04) : 842 - 850