A new key escrow cryptosystem

  • Jingmin He
  • Ed Dawson
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1029)


The Escrowed Encryption Standard (EES) proposed by U.S. government has gained much attention in the last two years. It was claimed that EES can provide cryptographic protection to unclassified, sensitive data, while at the same time, allow for the decryption of encrypted messages when lawfully authorized. Later, some criticism was proposed to reveal the weakness of the EES proposal.

In this paper we propose a new key escrow cryptosystem. The system eliminates many known weaknesses of the EES proposal. Particularly, the new system strengthens the weakest part of the EES proposal, i.e., the checksum generation, and provides other benefits that the original EES proposal did not have.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
    D.M.Balenson, C.M.Ellison, S.B.Lipner, and S.T.Walker, A new approach to software key escrow encryption, manuscript, 1994.Google Scholar
  2. [2]
    T.Beth, H.Knobloch,M.Otten,G.J.Simmons, and P.Wichmann, Towards acceptable key escrow systems, Proceedings of the 2nd ACM Conference on Computer and Communications Security, 1994, pp.51–58.Google Scholar
  3. [3]
    T.Beth and M.Otten, eds, Proceedings of the E.I.S.S. Workshop on Escrowed Key Cryptography, Workshop held at the European Institute for System Security, University of Karlsruhe, June 22–24, 1994.Google Scholar
  4. [4]
    M.Blaze, Protocol failure in the escrowed encryption standard, Proceedings of the 2nd ACM Conference on Computer and Communications Security, 1994, pp.59–67.Google Scholar
  5. [5]
    B.Chor, A.Fiat and M.Naor, Tracing traitors, CRYPTO'94, pp.257–270.Google Scholar
  6. [6]
    Y.Desmedt, How to secure the LEAF in Clipper Alternatives, in [3], pp.78–86.Google Scholar
  7. [7]
    S.Micali, Fair public-key cryptosystems, CRYPTO'92, pp.Google Scholar
  8. [8]
    National Institute for Standards and Technology, Escrowed Encryption Standard, Federal Information Processing Standards Publication 185, U.S. Dept. of Commerce, 1994.Google Scholar
  9. [9]
    M.Smid, US government key escrow, talk outline in [3], pp. 45–55.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1996

Authors and Affiliations

  • Jingmin He
    • 1
  • Ed Dawson
    • 1
  1. 1.Information Security Research CenterQueensland University of TechnologyBrisbaneAustralia

Personalised recommendations