On using RSA with low exponent in a public key network
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
A new approach to software key escrow encryption
Building in big brother
Cryptography's role in securing the information society
Cryptography's role in securing the information society
Cryptography: Theory and Practice
Cryptography: Theory and Practice
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Wallet Databases with Observers
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
A Key Escrow System with Warrant Bounds
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
A Proposed Architecture for Trusted Third Party Services
Proceedings of the International Conference on Cryptography: Policy and Algorithms
Finding a small root of a univariate modular equation
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Securing traceability of ciphertexts: towards a secure software key escrow system
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
How to break fraud-detectable key recovery
ACM SIGOPS Operating Systems Review
A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
An Analysis of Integrity Services in Protocols
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
A New type of ``Magic Ink'' Signatures - Towards Transcript-Irrelevant Anonymity Revocation
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchy
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Toward Fair International Key Escrow
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
A PVSS as Hard as Discrete Log and Shareholder Separability
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Auto-recoverable Auto-certifiable Cryptosystems (A Survey)
Proceedings of the International Exhibition and Congress on Secure Networking - CQRE (Secure) '99
On Solutions to the Key Escrow Problem
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Comments on an efficient secret broadcast in the broadcasting networks
IEEE Communications Letters
Non-interactive distributed encryption: a new primitive for revocable privacy
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
Recoverable encryption through a noised secret over a large cloud
Transactions on Large-Scale Data- and Knowledge-centered systems IX
Hi-index | 0.00 |
We propose a concept for a worldwide information security infrastructure that protects law-abiding citizens, but not criminals, even if the latter use it fraudulently (i.e. when not complying with the agreed rules). It can be seen as a middle course between the inflexible but fraud-resistant KMI-proposal [8] and the flexible but non-fraud-resistant concept used in TIS-CKE [2]. Our concept consists of adding binding data to the latter concept, which will not prevent fraud by criminals but makes it P t least detectable by third parties without the need of any secret information. In [19], we depict a worldwide framework in which this concept could present a security tool that is flexible enough to be incorporated in any national cryptography policy, on both the domestic and foreign use of cryptography. Here, we present a construction for binding data for ElGamal type public key encryption schemes. As a side result we show that a particular simplification in a multiuser version of ElGamal does not affect its security.