Democratic Key Escrow Scheme
نویسندگان
چکیده
Cryptography is a dual-edged sword. On the one hand, it allows secure electronic communications by legitimate users. On the other hand, it can be used by criminals to thwart law enforcement efforts and by foreign countries to prevent security agencies from gathering intelligence information about these countries. However, the widespread use of cryptography is critical to the establishment of the Information Superhighway. In order to prevent illegal users from enjoying the same convenience, the most straight forward solution is to escrow every user's private key. Governments' prime concern focuses on law enforcement and national security. However, users' major worries are the security and potential abuses of these systems by the authorities. This is particularly important because, with the explosive growth of the Internet, a user's private key can be used to access a wide range of information about him/her. In recent years, numerous key escrow schemes have been proposed but their success will ultimately depend on the trust and acceptance by users. Unfortunately, all proposed systems suffer from one common weakness: concentration of trust. Even if the private key is split among several trustees, it is still too concentrated and thus too insecure. Another subtle yet equally important weakness is the contradiction to the spirit of democracy. In these schemes, user's fundamental right of privacy is at the mercy of the governments and a few trustees. It is unfair for most legitimate users to hand over their private keys to the authorities (or their agents), even before they have started any electronic communication. Given the fact that governments are strong and users are weak, this is unfair and undemocratic. This thesis proposes a key escrow scheme which is not only secure but also fair and democratic by introducing the concept of "electronic jury" similar to the jury system in the common law. This is a new mechanism to achieve proper balance of power and mutual trust by both users and authorities by distributing the key shares in the hands of electronic jury until they are required for lawful recovery. Publication arising out of this thesis Chor Wall Man, R. Sain.vi-Naini. •'Denu^cratic Key Escrow Scheme," in Second Australasian Conji rence on I iifoi-!;i a I ion Security and Privacy (ACISP'97)^ July 1997, published by Springer-Veriii'i; in the Lectures Notes of Computer vScience series. I hearby declare that I am the sole author of this thesis. I also declare that the material presented within is my own work, except where duly acknowledged, and that I am not aware of any similar work either prior to this thesis, or currently being pursued. I certify that this thesis has not been submitted for a degree in any other university or institution.
منابع مشابه
Partial Key Escrow Monitoring Scheme
During (partial) key escrow, how to monitor a user safely and eeciently is a very important problem. This paper initially proposes a monitoring scheme of a typical partial key escrow scheme. In this scheme, the escrowed key of a user is not compromised even if the user has been monitored for many times.
متن کاملEquitability in Retroactive Data Confiscation versus Proactive Key Escrow
The British Regulations of Investigatory Powers (RIP) Act 2000 is one of the first modern bills for mandatory disclosure of protected data in a democratic country. In this paper we compare this bill from a technical point of view with the US key escrow proposal (EES) and its variants and then, more generally we compare the merits of key confiscation vs key escrow. A major problem with key escro...
متن کاملEquitability in Retroactive Key Connscation versus Proactive Key Escrow
The British Regulations of Investigatory Powers (RIP) Act 2000 is one of the rst modern bills for mandatory disclosure of protected data in a democratic country. In this paper we compare this bill from a technical point of view with the US key escrow proposal (EES) and its variants and then, more generally we compare the merits of key connscation vs key escrow. A major problem with key escrow i...
متن کاملAn efficient certificateless signcryption scheme in the standard model
Certificateless public key cryptography (CL-PKC) is a useful method in order to solve the problems of traditional public key infrastructure (i.e., large amount of computation, storage and communication costs for managing certificates) and ID-based public key cryptography (i.e., key escrow problem), simultaneously. A signcryption scheme is an important primitive in cryptographic protocols which ...
متن کاملRemove Key Escrow from The Identity-Based Encryption System
Key escrow is an inherent property in the current proposed Identity-Based Encryption (IBE) systems. However the key escrow is not always a good property for all applications. In this paper, we present a scheme which removes the key escrow from the IBE system proposed by Bonch and Franklin, while at the same time maintaining some important properties of the IBE. We also present some cryptosystem...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1997