Another approach to software key escrow encryption

  • Ed Dawson
  • Jingmin He
Session 3: Encryption and Cryptographic Functions
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1172)


Key escrow cryptography has gained much attention in the last two years. A key escrow system can provide cryptographic protection to unclassified, sensitive data, while at the same time, allows for the decryption of encrypted messages when lawfully authorized.

In this paper we propose a protocol for supporting the implementation of key escrow systems in software. Our protocol is an improvement on two previous protocols proposed in [1].

Key words

Key escrow law enforcement wiretapping public key 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    D.M.Balenson, C.M.Ellison, S.B.Lipner, and S.T.Walker, A new approach to software key escrow encryption, manuscript, 1994.Google Scholar
  2. 2.
    M.Blaze, Protocol failure in the escrowed encryption standard, Proceedings of the 2nd ACM Conference on Computer and Communications Security, 1994, pp.59–67.Google Scholar
  3. 3.
    J.He and E.Dawson, A new key escrow cryptosystem, in Cryptography: Policy and Algorithms, Springer-Verlag 1995, LNCS Vol.1029,pp.105–114.Google Scholar
  4. 4.
    Y.Desmedt, Securing traceability of ciphertexts — towards a secure software key escrow system, Advances in Cryptology, L.C.Guillon and V.Quisquater (editors), LNCS 921, Springer-Verlag 1995, pp.147–157.Google Scholar
  5. 5.
    L.Knudsen and T.Pedersen, On the difficulty of software key escrow, Advances in Cryptology: EUROCRYPT'96, Springer-Verlag 1996, LNCS 1070, pp.237–244.Google Scholar
  6. 6.
    S.Micali, Fair public-key cryptosystems, Advances in Cryptology: CRYPTO'92, Springer-Verlag 1993, LNCS 740, pp.113–138.Google Scholar
  7. 7.
    National Institute for Standards and Technology, The digital signature standard, Comm. ACM, Vol. 35, No.7, 1992, pp. 36–40.Google Scholar
  8. 8.
    National Institute for Standards and Technology, Escrowed Encryption Standard, Federal Information Processing Standards Publication 185, U.S. Dept. of Commerce, 1994.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1996

Authors and Affiliations

  • Ed Dawson
    • 1
  • Jingmin He
    • 1
  1. 1.Information Security Research CentreQueensland University of TechnologyBrisbaneAustralia

Personalised recommendations