scispace - formally typeset
Search or ask a question
Topic

Key escrow

About: Key escrow is a research topic. Over the lifetime, 1162 publications have been published within this topic receiving 19616 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: A self-certified signature scheme (SCS) from pairings on elliptic curves is proposed that incorporates the advantages of self- Certified public keys and pairings and can also provide an implicit as well as mandatory verification of public keys.

19 citations

Proceedings ArticleDOI
14 Nov 2004
TL;DR: This paper presents an ID-based threshold decryption scheme ThD based on bilinear Diffie-Hellman inversion assumption, and proves that it is selective chosen plaintext secure without random oracles, and enhances ThD to a more secure level with ciphertext validation test before decryption.
Abstract: In this paper, we first present an ID-based threshold decryption scheme ThD based on bilinear Diffie-Hellman inversion assumption, and prove that it is selective chosen plaintext secure without random oracles. Then, we enhance ThD to a more secure level with ciphertext validation test before decryption. At last, we apply ThD to key escrow, resulting in a robust threshold key escrow system.

19 citations

Proceedings Article
18 Oct 1998
TL;DR: This work considers two applications: time controlled key escrow and time controlled auctions with closed bids, one for each application, and proposes two protocols, one of which requires the use of tamper-proof devices.
Abstract: With equitable key escrow the control of society over the individual and the control of the individual over society are shared fairly. In particular, the control is limited to specified time periods. We consider two applications: time controlled key escrow and time controlled auctions with closed bids. In the first the individual cannot be targeted outside the period authorized by the court. In the second the individual cannot withhold his closed bid beyond the bidding period. We propose two protocols, one for each application. We do not require the use of tamper-proof devices.

18 citations

Journal ArticleDOI
TL;DR: This paper proposes a novel fundamental security requirement for certificateless aggregate signature schemes, called coalition resistance, by presenting coalition attacks on Zhang-Zhang's scheme.
Abstract: Certificateless cryptography eliminates the need of certificates in public key cryptosystems and solves the inherent key escrow problem in identity-based cryptosystems. An aggregate signature scheme is a signature scheme which allows to aggregate n signatures on n distinct messages from n distinct users into a single signature. Recently, Zhang and Zhang proposed a certificateless aggregate signature scheme provably secure in the random oracle model under the Computational Diffie-Hellman assumption. In this paper, we propose a novel fundamental security requirement for certificateless aggregate signature schemes, called coalition resistance, by presenting coalition attacks on Zhang-Zhang's scheme.

18 citations

Book
02 Jan 1995
TL;DR: No technique has been proposed that addresses the issues associated with the implementation of a classified encyption algorithm, such as the Skipjack algorithm embodied in the Clipper chip, in a widely used software product.
Abstract: The major deficiency ascribed to key escrow techniques when they are implemented solely in software is that they can be bypassed or subverted relatively easily and thus cannot be relied upon to meet the objectives of law enforcement that motivate the Clipper Initiative. Further, no technique has been proposed that addresses the issues associated with the implementation of a classified encyption algorithm, such as the Skipjack algorithm embodied in the Clipper chip, in a widely used software product.

18 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
85% related
Routing protocol
46.5K papers, 901.8K citations
80% related
Wireless ad hoc network
49K papers, 1.1M citations
79% related
Key distribution in wireless sensor networks
59.2K papers, 1.2M citations
78% related
Server
79.5K papers, 1.4M citations
78% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20241
202351
202289
202150
202072
201958