Another approach to software key escrow encryption
Key escrow cryptography has gained much attention in the last two years. A key escrow system can provide cryptographic protection to unclassified, sensitive data, while at the same time, allows for the decryption of encrypted messages when lawfully authorized.
In this paper we propose a protocol for supporting the implementation of key escrow systems in software. Our protocol is an improvement on two previous protocols proposed in .
Key wordsKey escrow law enforcement wiretapping public key
Unable to display preview. Download preview PDF.
- 1.D.M.Balenson, C.M.Ellison, S.B.Lipner, and S.T.Walker, A new approach to software key escrow encryption, manuscript, 1994.Google Scholar
- 2.M.Blaze, Protocol failure in the escrowed encryption standard, Proceedings of the 2nd ACM Conference on Computer and Communications Security, 1994, pp.59–67.Google Scholar
- 3.J.He and E.Dawson, A new key escrow cryptosystem, in Cryptography: Policy and Algorithms, Springer-Verlag 1995, LNCS Vol.1029,pp.105–114.Google Scholar
- 4.Y.Desmedt, Securing traceability of ciphertexts — towards a secure software key escrow system, Advances in Cryptology, L.C.Guillon and V.Quisquater (editors), LNCS 921, Springer-Verlag 1995, pp.147–157.Google Scholar
- 5.L.Knudsen and T.Pedersen, On the difficulty of software key escrow, Advances in Cryptology: EUROCRYPT'96, Springer-Verlag 1996, LNCS 1070, pp.237–244.Google Scholar
- 6.S.Micali, Fair public-key cryptosystems, Advances in Cryptology: CRYPTO'92, Springer-Verlag 1993, LNCS 740, pp.113–138.Google Scholar
- 7.National Institute for Standards and Technology, The digital signature standard, Comm. ACM, Vol. 35, No.7, 1992, pp. 36–40.Google Scholar
- 8.National Institute for Standards and Technology, Escrowed Encryption Standard, Federal Information Processing Standards Publication 185, U.S. Dept. of Commerce, 1994.Google Scholar