A Key Escrow System with Warrant Bounds

نویسندگان

  • Arjen K. Lenstra
  • Peter Winkler
  • Yacov Yacobi
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Key Escrow Scheme with Time-Limited Monitoring for One-Way Communication

This paper studies several of the properties necessary for public-key-based escrow schemes, and observes that previous schemes lack some important properties. Focusing on the type of communication typified by email, we construct a novel and simple scheme that provides ‘warrant bounds’, ‘admissibility’, ‘surveillance switching’, ‘non-directive monitoring’, ‘off-line agency’ and many other useful...

متن کامل

Equitability in Retroactive Key Connscation versus Proactive Key Escrow

The British Regulations of Investigatory Powers (RIP) Act 2000 is one of the rst modern bills for mandatory disclosure of protected data in a democratic country. In this paper we compare this bill from a technical point of view with the US key escrow proposal (EES) and its variants and then, more generally we compare the merits of key connscation vs key escrow. A major problem with key escrow i...

متن کامل

A Mechanized Logic for Secure Key Escrow Protocol Verification

Reasoning about key escrow protocols has increasingly become an important issue. The Escrowed Encryption Standard (EES) has been proposed as a US government standard for the encryption of un-classiied telecommunications. One unique feature of this system is key escrow. The purpose of key escrow is to allow government access to session keys shared by EES devices. We develop a framework to formal...

متن کامل

Remove Key Escrow from The Identity-Based Encryption System

Key escrow is an inherent property in the current proposed Identity-Based Encryption (IBE) systems. However the key escrow is not always a good property for all applications. In this paper, we present a scheme which removes the key escrow from the IBE system proposed by Bonch and Franklin, while at the same time maintaining some important properties of the IBE. We also present some cryptosystem...

متن کامل

Equitability in Retroactive Data Confiscation versus Proactive Key Escrow

The British Regulations of Investigatory Powers (RIP) Act 2000 is one of the first modern bills for mandatory disclosure of protected data in a democratic country. In this paper we compare this bill from a technical point of view with the US key escrow proposal (EES) and its variants and then, more generally we compare the merits of key confiscation vs key escrow. A major problem with key escro...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1995