A key escrow system of the RSA cryptosystem
This paper focuses a key escrow system of the RSA cryptosystem that protects user privacy with the following properties; (1) neither investigation agency nor key escrow agent accesses private key of user directly, (2) investigation agency can decrypt user data of restricted time period and communication entities, and (3) split private keys of user are deposited correctly in multiple key escrow agents without any information leakage of the private key with help of a zero-knowledge interactive protocol. The security of the whole system is discussed as well as the performance of the zero-knowledge interactive protocol.
KeywordsData Encryption Target User Average Response Time Encrypt Data Investigative Agency
Unable to display preview. Download preview PDF.
- 1.C.Boyd, “Some Applications of Multiple Key Ciphers,” Advances in Cryptology: Proceedings of Crypto 88, Springer-Verlag, pp. 455–467 (1989)Google Scholar
- 2.W.Diffie and M.Hellman, “New Directions in Cryptography,” IEEE Transactions of Information Theory, 22 pp. 644–654 (1976)Google Scholar
- 3.R.ElGamal, “A public key cryptosystem and a signature scheme based on discrete logarithms,” IEEE Transactions on Information Theory, 31, pp.469–472 (1985)Google Scholar
- 4.A.Fiat and A.Shamir, “How To Prove Yourself: Practical Solutions to Identification and Signature Problems,” Advances in Cryptology: Proceedings of Crypto 86, Springer-Verlag, pp. 186–194 (1987)Google Scholar
- 5.A.K.Lenstra, P.Winkler and Y.Yacobi, “A Key Escrow System with Warrant Bounds,” Advances in Cryptology: Proceedings of CRYPTO'95, Springer-Verlag, pp. 197–207 (1995)Google Scholar
- 6.S.Micali, “Fair Public-Key Cryptosystems,” Advances in Cryptology: Proceedings of CRYPTO'92, Springer-Verlag, pp. 113–138 (1992)Google Scholar
- 7.OrganizationforEconomicCo-operationandDevelopment, “OECD Adopts Guidelines for Cryptography Policy,” (http://www.oecd.org/newsand-events/release/nw97-24a.htm) (March 1997)Google Scholar
- 8.R.L.Rivest, A.Shamir and L.Adleman, “A method for obtaining digital signatures and public key cryptosystems,” Communications of ACM, 21, pp. 120–126 (1978)Google Scholar
- 9.B.Schneier, Applied Cryptography, Second Edition, John Wiley & Sons, Inc. (1996)Google Scholar
- 10.I.Taylor (MBE MP Minister for Science & Technology), “Licensing of Trusted Third Parties for the Provision of Encryption Services,” Public Consultation Paper on Detailed Proposals for Legislation (http://dtiinfo1.dti.gov.uk/pubs/) (March 1997)Google Scholar
- 11.The White House, Office of the Press Secretary, “Statement by the Press Secretary,” (http://www.eff.org/pub/Privacy/Key-escrow/Clipper/Clipper-II/Clipper /Key-esc:row/CIipl>er_Capstone_EES-I'essera Skipjack/wh_c.ryl)to-original.attnouoce) (16th April 1993)Google Scholar
- 12.Y.Yamane and K.Sakurai, “How to restrict investigators' tapping in Key Escrow Systems,” (in Japanese) The 1996 Symposium on Cryptography and Information Security 7C, The Institute of Electronics, Information and Communication Engineers (January 1996)Google Scholar