Abstract
Recently, key escrow schemes have been the topic of much debate and confusion. On the one hand, cryptography allows privacy of electronic communication for the honest citizens. On the other hand, it can be used by criminals to thwart law enforcement efforts. It seems that only by escrowing everyone's private key can we tackle this dilemma. In recent years, numerous key escrow schemes have been proposed. However, they all suffer from at least one common weakness: concentration of trust. Even if the private key is split among several trustees, it is still too concentrated and thus too dangerous. Another subtle yet equally important weakness is the contradiction to the spirit of democracy. In these schemes, individual's fundamental right of privacy is at the mercy of the governments and a handful of trustees. Every innocent and honest individual is required to hand over his private key to authorities (or their agents), even before he has started any electronic communication. This is not only insecure but also unfair and undemocratic.
In this paper, we propose a key escrow scheme which is not only secure but also fair and democratic.
Preview
Unable to display preview. Download preview PDF.
References
C.Boyd. “Some Applications of Multiple Key Ciphers”. EUROCRYPT 88 Proceeding, pages 455–467, 1988.
Dorothy E. Denning. “Taxonomy for key escrow encryption systems”. Communication of the ACM, pages 35–40, 3/1996.
National Institute for Standards and Technology. “Escrowed Encryption Standard”. Federal Information Processing Standards Publication 185, U.S.Dept. of Commerce, 1994.
J.Kilian and T.Leighton. “Fair cryptosystems revisited”. CRYPTO 95 Proceeding, pages 113–138, 1995.
Tim May. “Crypto Anarchy and Virtual Communities”. Internet Security, pages 4–12, Aril 1992.
M.Blaze. “Protocol failure in the escrowed encryption standard”. Proceedings of the 2nd ACM Conference on Computer and Communication, pages 59–67, 1994.
M Wlker N Jefferies, C Mitchell. “A Proposed Architecture for Trusted Third Party Services”. Proceedings of Cryptography Policy and Algorithms Conference, pages 67–81, 3–5 July 1995.
George Orwell. “1984”. Peguin Books, pages 6–7, 1954.
Micheal Roe Ross Anderson. “The GCHQ Protocol and its Problems”, http://www.cl.cam.ac.uk/rja14/, 8th June 1996.
Adi Shamir. “How to share a secret”. Communication of the ACM, pages 612–613, 11/1979.
S.Macali. “Fair public key cryptosystems”. CRYPTO 92 Proceeding, pages 113–138, 1992.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1997 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Man, C.W., Safavi-Naini, R. (1997). Democratic key escrow scheme. In: Varadharajan, V., Pieprzyk, J., Mu, Y. (eds) Information Security and Privacy. ACISP 1997. Lecture Notes in Computer Science, vol 1270. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0027932
Download citation
DOI: https://doi.org/10.1007/BFb0027932
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-63232-0
Online ISBN: 978-3-540-69237-9
eBook Packages: Springer Book Archive