Proceedings of the 4th ACM conference on Computer and communications security
Publicly verifiable partial key escrow
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
Enforcing traceability in software
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
A Key Escrow System with Warrant Bounds
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically)
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
FC '98 Proceedings of the Second International Conference on Financial Cryptography
Proceedings of the International Conference on Cryptography: Policy and Algorithms
Publicly verifiable secret sharing
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Security Analysis and Improvement of the Global Key Recovery System
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
Hi-index | 0.00 |
Limiting escrow activity in time has been an important requirement for key escrow systems. Recently two protocols were proposed for limited time span key escrow and contract bidding. We investigate the proposed protocols, bring out certain issues that were neglected in the proposal and amend it in a manner that these issues will be dealt with. Our proposal does not require tamper proofness for security of the system and assumes minimal trust in the trustees of the system to achieve a more robust scheme. The importance of publicly verifiable proofs is highlighted in this paper.