Binding ElGamal: A Fraud-Detectable Alternative to Key-Escrow Proposals

نویسندگان

  • Eric R. Verheul
  • Henk C. A. van Tilborg
چکیده

We propose a concept for a worldwide information security infrastructure that protects law-abiding citizens, but not criminals, even if the latter use it fraudulently (i.e. when not complying with the agreed rules). It can be seen as a middle course between the inflexible but fraudresistant KMI-proposal [8] and the flexible but non-fraud-resistant concept used in TIS-CKE [2]. Our concept consists of adding binding data to the latter concept, which will not prevent fraud by criminals but makes it at least detectable by third parties without the need of any secret information. In [19], we depict a worldwide framework in which this concept could present a security tool that is flexible enough to be incorporated in any national cryptography policy, on both the domestic and foreign use of cryptography. Here, we present a construction for binding data for ElGamal type public key encryption schemes. As a side result we show that a particular simplification in a multiuser version of ElGamal does not affect its security.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchy

In this paper we present a new Auto-Recoverable AutoCertifiable Cryptosystem that is based on an algebraic problem different from the original system (of Eurocrypt’98). Specifically, our new cryptosystem uses generalized ElGamal and RSA. It has the following new advantages: (1) the escrow authority’s key can be set-up much faster than in the original scheme; and (2) It can be used to implement ...

متن کامل

Self-Escrowed Public-Key Infrastructures

This paper introduces a cryptographic paradigm called selfescrowed encryption, a concept initiated by kleptography. In simple words, a self-escrowed public-key cryptosystem features the property that the scheme’s public and private keys are connected to each other by the mean of an other cryptosystem, called the master scheme. We apply this notion to the design of auto-recoverable autocertifiab...

متن کامل

A comparison of fraud cues and classification methods for fake escrow website detection

The ability to automatically detect fraudulent escrow websites is important in order to alleviate online auction fraud. Despite research on related topics, such as web spam and spoof site detection, fake escrow website categorization has received little attention. The authentic appearance of fake escrow websites makes it difficult for Internet users to differentiate legitimate sites from phonie...

متن کامل

Hope or Hype: On the Viability of Escrow Services as Trusted Third Parties in Online Auction Environments

Internet fraud has been on the rise in online consumer-to-consumer (C2C) auction markets, posing serious challenges to people’s trust in electronic markets. Among various remedies to promote trust and reduce trader’s risk, online escrow service has been proposed as a trusted third party to protect online transactions from Internet fraud. However, whether an escrow service constitutes a viable b...

متن کامل

Encrypted Digital Cash Transfers: Why Traditional Money Laundering Controls May Fail Without Uniform Cryptography Regulations

This Note argues that key escrow represents a solution to the problem of digital money laundering. In addition, this Note argues that the European Commission has wrongly concluded that key escrow should develop as a product of market forces rather than aggressive legislation, and should align its policy with the United States, France, and Great Britain to develop a joint network of key escrow a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997