The complexity of promise problems with applications to public-key cryptography
Information and Control
Communications of the ACM
Protocol failure in the escrowed encryption standard
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
How to share a function securely
STOC '94 Proceedings of the twenty-sixth annual ACM symposium on Theory of computing
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Distributed provers with applications to undeniable signatures
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Proceedings of the 4th ACM conference on Computer and communications security
Publicly Verifiable Key Escrow with Limited Time Span
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
Security Analysis and Improvement of the Global Key Recovery System
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
On the Difficulty of Key Recovery Systems
ISW '99 Proceedings of the Second International Workshop on Information Security
Toward Fair International Key Escrow
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Equitability in Retroactive Data Confiscation versus Proactive Key Escrow
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
A PVSS as Hard as Discrete Log and Shareholder Separability
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Auto-recoverable Auto-certifiable Cryptosystems (A Survey)
Proceedings of the International Exhibition and Congress on Secure Networking - CQRE (Secure) '99
On Solutions to the Key Escrow Problem
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
Binding ElGamal: a fraud-detectable alternative to key-escrow proposals
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Hi-index | 0.00 |
We propose a key escrow system that permits warrants for the interception and decryption of communications for arbitrary time periods, and with either one or two communicating parties specified as the target. The system is simple and practical, and affords reasonable protection against misuse. We argue that use of such a system can produce both greater privacy protection and more effective law enforcement than we now enjoy.