A key escrow system with protecting user's privacy by blind decoding

被引:0
作者
Sakurai, K [1 ]
Yamane, Y
Miyazaki, S
Inoue, T
机构
[1] Kyushu Univ, Dept Comp Sci, Higashi Ku, Fukuoka 81281, Japan
[2] Secur Tech Res Lab Co Ltd, Adv Mobile Telecomm, Kanagawa 222, Japan
来源
INFORMATION SECURITY | 1998年 / 1396卷
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We propose a new key recovery system with satisfying the following properties: 1. The court-authorized eavesdropping by the investigator is limited both in tapping time and in tapped conversation. 2. Trustees, who are cooperating with the investigator to eavesdrop a user's communication, cannot know whom the investigator is intercepting. 3. No investigator can obtain illegally the secret key of users against which no legitimate court order has been issued. Our system utilizes the blind decoding: a client has a message encrypted with a server's secret key and the client asks the server to decode the message without revealing what is the decoded plaintext nor learning the server's secret key. Our system also introduces two agencies besides the trustees. These are related to the mechanism of registering users and of distributing the user's escrowed keys, named "Key Producer," and "Registration Center." Our system can be implemented by using only the discrete-log based cryptosystems (the Diffie-Hellman and the ElGamal).
引用
收藏
页码:147 / 157
页数:11
相关论文
共 30 条
[1]  
ANDERSON RJ, 1996, P CRYPTO 95, P236
[2]  
[Anonymous], BUILDING BIG BROTHER
[3]  
[Anonymous], P CRYPTO 85
[4]  
BALENSON DM, 1994, NEW APPROACH SOFTWAR
[5]  
BETH T, 1994, P 2 ACM C COMP COMM, P51
[6]  
BLAZE M, 1994, P 2 ACM C COMP COMM, P59
[7]  
BLAZE M, 1994, P 2 ACM C COMP COMM
[8]  
BRICKELL E, 1995, PROCEEDINGS OF THE SIXTH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS, P457
[9]  
BRICKELL EF, 1993, SKIPJACK REV INTERIM
[10]  
CAMENISCH JL, 1994, ADV CRYPTOLOGY