On the difficulty of software key escrow

  • Authors:
  • Lars R. Knudsen;Torben P. Pedersen

  • Affiliations:
  • Katholieke Universiteit Leuven, Belgium;Cryptomathic, Denmark

  • Venue:
  • EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
  • Year:
  • 1996

Quantified Score

Hi-index 0.00

Visualization

Abstract

At Eurocrypt'95, Desmedt suggested a scheme which allows individuals to encrypt in such a way that the receiver can be traced by an authority having additional information. This paper shows that the proposed scheme does not have the required properties, by devising three non-specified protocols misleading the authority. We also discuss how to repair Desmedt's scheme, such that our attacks are no longer possible. However, by allowing slightly more general, but absolutely realistic attacks also this improved system can be broken. In fact, we argue that software key escrow as proposed by Desmedt will be very hard to implement as it requires that the distributed public key can only be used in few, well-defincd systems. Furthermore, even if this is achieved, most applications to key distribution can be broken.