Topic
Key escrow
About: Key escrow is a research topic. Over the lifetime, 1162 publications have been published within this topic receiving 19616 citations.
Papers published on a yearly basis
Papers
More filters
•
TL;DR: In this article, the authors argue that key escrow represents a solution to the problem of digital money laundering and argue that the European Commission has wrongly concluded that Key Escrow should develop as a product of market forces rather than aggressive legislation.
Abstract: This Note argues that key escrow represents a solution to the problem of digital money laundering. In addition, this Note argues that the European Commission has wrongly concluded that key escrow should develop as a product of market forces rather than aggressive legislation, and should align its policy with the United States, France, and Great Britain to develop a joint network of key escrow authorities. Part I of this Note explains the operation of digital payment systems, digital money, and cryptography. Part I also sets forth existing legal safeguards against money laundering. Part II outlines the key escrow policies of the European Community, Great Britain, France, and the United States. Part III analyzes the European Commission’s arguments against implementing key escrow and suggests that these arguments have been addressed and effectively rebutted by key escrow proposals in the United States and Great Britain. This Note concludes that a global network of key escrow authorities would provide law enforcement with the means to prevent digital money laundering.
5 citations
•
TL;DR: Based on the Computational Diffie-Hellman Assumption, this paper proposes a certificateless partially blind signature scheme that allows the user to get a signature without giving the signer any information about the actual message and the resulting signature.
Abstract: Certificateless Public Key Cryptography as a new cryptographic paradigm was firstly introduced by Al-Riyami and Paterson in Asiacrypt 2003,which avoids the inherent key escrow problem of identity-based cryptography and does not require certificates to guarantee the authenticity of public keys as in the public key infrastructure.Partially blind signature is a variant of digital signatures,which allows the user to get a signature without giving the signer any information about the actual message and the resulting signature.Based on the Computational Diffie-Hellman Assumption,in this paper,we propose a certificateless partially blind signature scheme.
5 citations
•
01 Jan 1996
TL;DR: An open forum on privacy and security policy choices in an NII environment and how to fairly reconstruct a shared secret are discussed.
Abstract: Open forum - Cryptography: Personal freedom and law enforcement is it possible to get agreement?.- Privacy and security policy choices in an NII environment.- Commercial Key Escrow: An Australian perspective.- Encryption and the Global Information Infrastructure: An Australian perspective.- Crypto in Europe - markets, law and policy.- Saving dollars makes sense of crypto export controls.- A proposed architecture for trusted third party services.- A new key escrow cryptosystem.- How to fairly reconstruct a shared secret.- A note on nonuniform decimation of periodic sequences.- Randomness measures related to subset occurrence.- Low order approximation of cipher functions.- Multiple encryption with minimum key.- A one-key cryptosystem based on a finite nonlinear automaton.- A cryptanalysis of clock-controlled shift registers with multiple steps.- Discrete optimisation and fast correlation attacks.- Keyed hash functions.- Some active attacks on fast server-aided secret computation protocols for modular exponentiation.- Cryptanalysis of the enhanced ElGamal's signature scheme.- Access with pseudonyms.- A new identification algorithm.- Public-key cryptography on smart cards.- Integrating smart cards into authentication systems.- Smart-card with interferometric quantum cryptography device.- Cryptographic APIs.- Foiling active network impersonation attacks made in collusion with an insider.- The CASS shell.
5 citations
••
TL;DR: A threshold key Escrow scheme from pairing that tolerates the passive adversary to access any internal data of corrupted key escrow agents and the active adversary that can make corrupted servers to deviate from the protocol is proposed.
Abstract: This paper proposes a threshold key escrow scheme from pairing. It tolerates the passive adversary to access any internal data of corrupted key escrow agents and the active adversary that can make corrupted servers to deviate from the protocol. The scheme is secure against threshold adaptive chosen-ciphertext attack. The formal proof of security is presented in the random oracle model, assuming the decision Bilinear Diffie-Hellman problem is computationally hard.
5 citations
••
TL;DR: This work proposes a new multiauthority CP-ABE with blackbox and public traceability, where the private keys are assigned by the cooperation between one central authority and multi-authorities, and indicates that the proposed scheme is highly efficient and provably secure under the security model.
Abstract: Ciphertext-policy Attribute-based encryption (CP-ABE) is a promising tool for implementing finegrained cryptographic access control. While the uniqueness of generating private keys brings extra security issues. The key escrow is inherent in CP-ABE systems because the trusted authority has the power to decrypt every ciphertext. The private keys are only associated with the attributes nor the user's identity. Some malicious users might be tempted to leak their decryption privileges for financial gain without the risk of being caught as the decryption privilege could be shared by multiple users who own the same set of attributes. We propose a new multiauthority CP-ABE with blackbox and public traceability, where the private keys are assigned by the cooperation between one central authority and multi-authorities. The performance and security analyses indicate that the proposed scheme is highly efficient and provably secure under the security model.
5 citations