A proposed architecture for trusted third party services
In this paper we propose a novel solution to the problem of providing trusted third party services, such as the management of cryptographic keys for end-to-end encryption, in a way that meets legal requirements for warranted interception. Also included is a discussion of what might be a reasonable set of requirements for international provision of such services, as well as some analysis of the cryptographic properties of the architecture and how it might operate in practice.
Unable to display preview. Download preview PDF.
- [Burm94]Mike Burmester. ‘On the Risk of Opening Distributed Keys'. In Advances in Cryptology—CRYPTO '94, Springer-Verlag, Berlin (1994), pp. 308–317.Google Scholar
- [DH76]Whitfield Diffie and Martin E. Hellman. ‘New Directions in Cryptography.’ IEEE Transactions in Information Theory IT-22 (1976) pages 644–655.Google Scholar
- [FIPS185]National Institute of Standards and Technology. FIPS Publication 185: Escrowed Encryption Standard, February 1994.Google Scholar
- [Goss90]US Patent 4956863. Cryptographic Method and Apparatus for Public Key Exchange with Authentication. Granted 11 September 1990.Google Scholar
- [ISO9979]ISO/IEC 9979:1991. Data Cryptographic Techniques — Procedures for the Registration of Cryptographic Algorithms. December 1991.Google Scholar
- [Mica93]Silvio Micali. Fair Cryptosystems. MIT Technical Report MIT/LCS/TR-579.b, November 1993.Google Scholar
- [Yaco90]Yacov Yacobi. ‘A key distribution paradox.’ In Advances in Cryptology — CRYPTO '90, Springer-Verlag, Berlin (1991), pp. 268–273.Google Scholar