scispace - formally typeset
Journal ArticleDOI

A taxonomy for key escrow encryption systems

Reads0
Chats0
TLDR
A taxonomy for key escrow encryption systems is presented, providing a structure for describing and categorizing the escrow mechanisms of complete systems as well as various design options.
Abstract
decrypt ciphertext with the help of information supplied by one or more trusted parties holding special data recovery keys. The data recovery keys are not normally the same as those used to encrypt and decrypt the data, but rather provide a means of determining the data encryption/decryption keys. The term key escrow is used to refer to the safeguarding of these data recovery keys. Other terms used include key archive, key backup, and data recovery system. This article presents a taxonomy for key escrow encryption systems, providing a structure for describing and categorizing the escrow mechanisms of complete systems as well as various design options. Table 1 applies the taxonomy to several key escrow products or proposals. The sidebar, “Glossary and Sources,” identifies key terms, commercial products, and proposed systems.

read more

Content maybe subject to copyright    Report

Citations
More filters
Book

Handbook of Applied Cryptography

TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Patent

System and method for secure three-party communications

TL;DR: In this paper, the authors propose a system and method for communicating information between a first party and a second party, comprising the steps of receiving, by an intermediary, an identifier of desired information and accounting information for a transaction involving the information from the first party, and negotiating, by the intermediary, a comprehension function for obscuring at least a portion of the information communicated between the first parties and the second parties.
Journal ArticleDOI

The economics of information security investment

TL;DR: In this article, an economic model that determines the optimal amount to invest to protect a given set of information is presented, taking into account the vulnerability of the information to a security breach and the potential loss should such a breach occur.

The Economics of Information Security Investment.

TL;DR: An economic model is presented that determines the optimal amount to invest to protect a given set of information and takes into account the vulnerability of the information to a security breach and the potential loss should such a breach occur.
Journal ArticleDOI

A method for taxonomy development and its application in information systems

TL;DR: The purpose of this paper is to present a method for taxonomy development that can be used in IS and demonstrates the efficacy of the method by developing a taxonomy in a domain in IS.
Related Papers (5)