Skip to main content

Advertisement

SpringerLink
Log in
Menu
Find a journal Publish with us
Search
Cart
Book cover

Annual International Cryptology Conference

CRYPTO 1998: Advances in Cryptology — CRYPTO '98 pp 169–185Cite as

  1. Home
  2. Advances in Cryptology — CRYPTO '98
  3. Conference paper
Identity escrow

Identity escrow

  • Joe Kilian1 &
  • Erez Petrank2 
  • Conference paper
  • First Online: 01 January 2006
  • 3676 Accesses

  • 100 Citations

  • 4 Altmetric

Part of the Lecture Notes in Computer Science book series (LNCS,volume 1462)

Abstract

We introduce the concept of escrowed identity, an application of key-escrow ideas to the problem of authentication. In escrowed identity, one party A does not give his identity to another party B, but rather gives him information that would allow an authorized third party E to determine A's identity. However, B receives a guarantee that E can indeed determine A's identity. We consider a number of possible features of escrowed identity schemes, and describe a variety of implementations that achieve various subsets of these features. In particular, we observe that group signature schemes can be used to escrow identities, achieving most (though not all) of the desired features.

The most interesting feature we consider is separability. The escrow agency is not involved in the day to day operation of the identification system, but is only called in when anonymity must be revoked. In the extreme case, there exist identity escrow schemes in which an arbitrary party (possessing a public key) can be designated an escrow agent without any knowledge or participation on their part until they are asked to revoke someone's anonymity.

Keywords

  • Encryption Scheme
  • Signature Scheme
  • Group Manager
  • Argument Framework
  • Supposed Relation

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Work done while at DIMACS.

Chapter PDF

Download to read the full chapter text

References

  1. Asokan, Shoup and Waidner. Optimistic Fair Exchange of Digital Signatures. IBM Research Report RZ2973, November 17, 1997.

    Google Scholar 

  2. M. Bellare and S. Goldwasser. Verifiable partial key escrow. Proceedings of the Fourth Annual Conference on Computer and Communications Security, ACM, 1997. Preliminary version appeared as Technical Report CS95-447, Dept. of CS and Engineering, UCSD, October 1995.

    Google Scholar 

  3. M. Bellare and S. Goldwasser. Encapsulated key escrow. MIT Laboratory for Computer Science Technical Report 688, April 1996.

    Google Scholar 

  4. M. Ben-Or, S. Goldwasser and A. Wigderson. Completeness theorems for non-cryptographic fault-tolerant distributed computations. In Proc. of the 20th Annu. Symposium on the Theory of Computing, pages 1–10, 1988.

    Google Scholar 

  5. E. Brickell, P. Gemmel and D. Kravitz. Trustee-based tracing extensions to anonymous cash and the making of anonymous change. In Proc. 6th Symposium on Discrete Algorithms, 1995, pp. 457–466

    Google Scholar 

  6. D. Boneh and M. Franklin. Efficient generation of shared RSA keys. Advances in Cryptology — CRYPTO '97 Proceedings, pp. 425–439. Lecture notes in Computer Science #1294, Springer Verlag, Berlin, 1997.

    Google Scholar 

  7. G. Brassard, D. Chaum and C. Crépeau. Minimum Disclosure Proofs of Knowledge. In JCSS, pages 156–189. 1988.

    Google Scholar 

  8. D. Chaum, C. Crepau, and I. Dåmgard. Multiparty unconditionally secure protocols. In Proc. of the 20th Annu. ACM Symp. on the Theory of Computing, pages 11–19, 1988.

    Google Scholar 

  9. R. Cramer, I. Damgård and B. Schoenmakers. Proofs of partial knowledge and simplified design of witness hiding protocols. Advances in Cryptology — CRYPTO '94 Proceedings, pp. 174–187. Lecture Notes in Computer Science #839, Berlin: Springer-Verlag, 1994.

    Google Scholar 

  10. Camenisch. Efficient and generalized group signatures. Advances in Cryptology — EUROCRYPT '97, volume 1233 of Lecture Notes in Computer Science, pages 465–479. Springer Verlag, 1997.

    Google Scholar 

  11. J. Camenisch and M. Stadler. Efficient Group Signature Schemes for Large Groups. Advances in Cryptology — CRYPTO '97 Proceedings, pp. 410–424. Lecture notes in Computer Science #1294, Springer Verlag, Berlin, 1997.

    Google Scholar 

  12. D. Chaum and E. van Heyst. Group signatures. Advances in Cryptology — EUROCRYPT '91, volume 547 of Lecture Notes in Computer Science, pages 257–265. SpringerVerlag, 1991.

    Google Scholar 

  13. L. Chen and T. P. Pedersen. New group signature schemes. Advances in Cryptology — EUROCRYPT '94, volume 950 of Lecture Notes in Computer Science, pages 171–181. SpringerVerlag, 1995.

    Google Scholar 

  14. I. Dåmgard, T. Pedersen and B. Pfitzmann. On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures. Advances in Cryptology — CRYPTO '93 Proceedings, pp. 250–265. Lecture Notes in Computer Science #773, Berlin: Springer-Verlag, 1994.

    Google Scholar 

  15. Yvo Desmedt and Yair Frankel. Theshold cryptosystems. Advances in Cryptology — CRYPTO '89 Proceedings, pp. 307–315. Berlin: Springer-Verlag, 1990.

    Google Scholar 

  16. T. El Gamal. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. Advances in Cryptology — CRYPTO '89 Proceedings, pp. 10–18. Berlin: Springer-Verlag, 1985.

    Google Scholar 

  17. Y. Frankel, Y. Tsiounis and M. Yung. “Indirect Discourse Proofs”: Achieving Efficient Fair Off-Line E-Cash. Advances in Cryptology-ASIACRYPT '96 proceedings, pp. 286–300. Lecture Notes in Computer Science #1163. Springer-Verlag, 19851996.

    Google Scholar 

  18. Y. Frankel and M. Yung. Escrow Encryption Systems Visited: Attacks, Analysis and Designs. Advances in Cryptology — CRYPTO '95 Proceedings, Berlin: Springer-Verlag, 1995.

    Google Scholar 

  19. S. Goldwasser and S. Micali. Probabilistic Encryption. In JCSS Vol 28(2), pages 270–299, 1984.

    MATH  MathSciNet  Google Scholar 

  20. J. Kilian and E. Petrank. Identity Escrow. Theory of Cryptography Library, ftp://theory.lcs.mit.edu/pub/tcryptol/97-11.p8, August 1997.

    Google Scholar 

  21. J. Kilian and F. T. Leighton. Fair Cryptosystems, Revisited. Advances in Cryptology — CRYPTO '95 Proceedings, Berlin: Springer-Verlag, 1995.

    Google Scholar 

  22. F. T. Leighton. Failsafe key escrow systems. Technical Memo 483, MIT Lab. for Computer Science, August 1994.

    Google Scholar 

  23. A. Lenstra, P. Winkler and Y. Yacobi. A Key Escrow System with Warrant Bounds. Advances in Cryptology — CRYPTO '95 Proceedings, Berlin: Springer-Verlag, 1995.

    Google Scholar 

  24. S. Micali Fair public-key cryptosystems. Advances in Cryptology — CRYPTO '92 Proceedings, Berlin: Springer-Verlag, 1993.

    Google Scholar 

  25. S. Micali. Fair public-key cryptosystems. Technical Report 579, MIT Lab. for Computer Science, September 1993.

    Google Scholar 

  26. S. Micali. Certified E-Mail With Invisible Post Offices. Talk at Workshop on Secure Computation, Weizmann Institute, June, 1998.

    Google Scholar 

  27. S. Micali and R. Sydney. A Simple Method for Generating and Sharing Pseudo-Random Functions, with Applications to Clipper-like Key Escrow Systems. Advances in Cryptology — CRYPTO '95 Proceedings, Berlin: Springer-Verlag, 1995.

    Google Scholar 

  28. H. Petersen. How to convert any digital signature scheme into a group signature scheme. Security Protocols Workshop, Paris, 1997.

    Google Scholar 

  29. J. Camenisch, U. Maurer, and M. Stadler. Digital payment systems with passive anonymityrevoking trustees. In proceedings, ESORICS: European Symposium on Research in Computer Security”, Springer-Verlag, 1996.

    Google Scholar 

  30. A. De Santis, Y. Desmedt, Y. Frankel and M. Yung. How to Share a Function Securely (Extended Summary). Proceedings of the Twenty-Sixth Annual ACM Symposium on Theory of Computing, pp. 522–533, Montréal, Québec, May 23–25, 1994.

    Google Scholar 

  31. Schneier, B. (1993). Applied Cryptography. John Wiley.

    Google Scholar 

  32. M. Stadler, J.-M. Piveteau and J. Camenisch Fair blind signatures. In Proc. Eurocrypt 95, 1995, LNCS 921, pp. 209–219

    MATH  Google Scholar 

  33. Adam Young and Moti Yung. Auto-Recoverable Auto-Certifiable Cryptosystems. Eurocrypt 98, LNCS 1403 (Ed. K. Nyberg), pp. 17–32.

    Google Scholar 

Download references

Author information

Authors and Affiliations

  1. NEC Research Institute, 4 Independence Way, 08540, Princeton, NJ, USA

    Joe Kilian

  2. IBM Haifa Research Lab, MATAM, 31905, Haifa, Israel

    Erez Petrank

Authors
  1. Joe Kilian
    View author publications

    You can also search for this author in PubMed Google Scholar

  2. Erez Petrank
    View author publications

    You can also search for this author in PubMed Google Scholar

Editor information

Editors and Affiliations

    Rights and permissions

    Reprints and Permissions

    Copyright information

    © 1998 Springer-Verlag Berlin Heidelberg

    About this paper

    Cite this paper

    Kilian, J., Petrank, E. (1998). Identity escrow. In: Krawczyk, H. (eds) Advances in Cryptology — CRYPTO '98. CRYPTO 1998. Lecture Notes in Computer Science, vol 1462. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0055727

    Download citation

    • .RIS
    • .ENW
    • .BIB
    • DOI: https://doi.org/10.1007/BFb0055727

    • Published: 28 May 2006

    • Publisher Name: Springer, Berlin, Heidelberg

    • Print ISBN: 978-3-540-64892-5

    • Online ISBN: 978-3-540-68462-6

    • eBook Packages: Springer Book Archive

    Share this paper

    Anyone you share the following link with will be able to read this content:

    Sorry, a shareable link is not currently available for this article.

    Provided by the Springer Nature SharedIt content-sharing initiative

    search

    Navigation

    • Find a journal
    • Publish with us

    Discover content

    • Journals A-Z
    • Books A-Z

    Publish with us

    • Publish your research
    • Open access publishing

    Products and services

    • Our products
    • Librarians
    • Societies
    • Partners and advertisers

    Our imprints

    • Springer
    • Nature Portfolio
    • BMC
    • Palgrave Macmillan
    • Apress
    • Your US state privacy rights
    • Accessibility statement
    • Terms and conditions
    • Privacy policy
    • Help and support

    44.197.101.251

    Not affiliated

    Springer Nature

    © 2023 Springer Nature