scispace - formally typeset
Search or ask a question
Topic

Key escrow

About: Key escrow is a research topic. Over the lifetime, 1162 publications have been published within this topic receiving 19616 citations.


Papers
More filters
Journal Article
TL;DR: In this article, the authors argue that key escrow represents a solution to the problem of digital money laundering and argue that the European Commission has wrongly concluded that Key Escrow should develop as a product of market forces rather than aggressive legislation.
Abstract: This Note argues that key escrow represents a solution to the problem of digital money laundering. In addition, this Note argues that the European Commission has wrongly concluded that key escrow should develop as a product of market forces rather than aggressive legislation, and should align its policy with the United States, France, and Great Britain to develop a joint network of key escrow authorities. Part I of this Note explains the operation of digital payment systems, digital money, and cryptography. Part I also sets forth existing legal safeguards against money laundering. Part II outlines the key escrow policies of the European Community, Great Britain, France, and the United States. Part III analyzes the European Commission’s arguments against implementing key escrow and suggests that these arguments have been addressed and effectively rebutted by key escrow proposals in the United States and Great Britain. This Note concludes that a global network of key escrow authorities would provide law enforcement with the means to prevent digital money laundering.

5 citations

Journal Article
TL;DR: Based on the Computational Diffie-Hellman Assumption, this paper proposes a certificateless partially blind signature scheme that allows the user to get a signature without giving the signer any information about the actual message and the resulting signature.
Abstract: Certificateless Public Key Cryptography as a new cryptographic paradigm was firstly introduced by Al-Riyami and Paterson in Asiacrypt 2003,which avoids the inherent key escrow problem of identity-based cryptography and does not require certificates to guarantee the authenticity of public keys as in the public key infrastructure.Partially blind signature is a variant of digital signatures,which allows the user to get a signature without giving the signer any information about the actual message and the resulting signature.Based on the Computational Diffie-Hellman Assumption,in this paper,we propose a certificateless partially blind signature scheme.

5 citations

Book
01 Jan 1996
TL;DR: An open forum on privacy and security policy choices in an NII environment and how to fairly reconstruct a shared secret are discussed.
Abstract: Open forum - Cryptography: Personal freedom and law enforcement is it possible to get agreement?.- Privacy and security policy choices in an NII environment.- Commercial Key Escrow: An Australian perspective.- Encryption and the Global Information Infrastructure: An Australian perspective.- Crypto in Europe - markets, law and policy.- Saving dollars makes sense of crypto export controls.- A proposed architecture for trusted third party services.- A new key escrow cryptosystem.- How to fairly reconstruct a shared secret.- A note on nonuniform decimation of periodic sequences.- Randomness measures related to subset occurrence.- Low order approximation of cipher functions.- Multiple encryption with minimum key.- A one-key cryptosystem based on a finite nonlinear automaton.- A cryptanalysis of clock-controlled shift registers with multiple steps.- Discrete optimisation and fast correlation attacks.- Keyed hash functions.- Some active attacks on fast server-aided secret computation protocols for modular exponentiation.- Cryptanalysis of the enhanced ElGamal's signature scheme.- Access with pseudonyms.- A new identification algorithm.- Public-key cryptography on smart cards.- Integrating smart cards into authentication systems.- Smart-card with interferometric quantum cryptography device.- Cryptographic APIs.- Foiling active network impersonation attacks made in collusion with an insider.- The CASS shell.

5 citations

Journal ArticleDOI
TL;DR: A threshold key Escrow scheme from pairing that tolerates the passive adversary to access any internal data of corrupted key escrow agents and the active adversary that can make corrupted servers to deviate from the protocol is proposed.
Abstract: This paper proposes a threshold key escrow scheme from pairing. It tolerates the passive adversary to access any internal data of corrupted key escrow agents and the active adversary that can make corrupted servers to deviate from the protocol. The scheme is secure against threshold adaptive chosen-ciphertext attack. The formal proof of security is presented in the random oracle model, assuming the decision Bilinear Diffie-Hellman problem is computationally hard.

5 citations

Journal ArticleDOI
TL;DR: This work proposes a new multiauthority CP-ABE with blackbox and public traceability, where the private keys are assigned by the cooperation between one central authority and multi-authorities, and indicates that the proposed scheme is highly efficient and provably secure under the security model.
Abstract: Ciphertext-policy Attribute-based encryption (CP-ABE) is a promising tool for implementing finegrained cryptographic access control. While the uniqueness of generating private keys brings extra security issues. The key escrow is inherent in CP-ABE systems because the trusted authority has the power to decrypt every ciphertext. The private keys are only associated with the attributes nor the user's identity. Some malicious users might be tempted to leak their decryption privileges for financial gain without the risk of being caught as the decryption privilege could be shared by multiple users who own the same set of attributes. We propose a new multiauthority CP-ABE with blackbox and public traceability, where the private keys are assigned by the cooperation between one central authority and multi-authorities. The performance and security analyses indicate that the proposed scheme is highly efficient and provably secure under the security model.

5 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
85% related
Routing protocol
46.5K papers, 901.8K citations
80% related
Wireless ad hoc network
49K papers, 1.1M citations
79% related
Key distribution in wireless sensor networks
59.2K papers, 1.2M citations
78% related
Server
79.5K papers, 1.4M citations
78% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20241
202351
202289
202150
202072
201958