Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically)

  • Authors:
  • Mike Burmester;Yvo Desmedt;Jennifer Seberry

  • Affiliations:
  • -;-;-

  • Venue:
  • ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
  • Year:
  • 1998

Quantified Score

Hi-index 0.01

Visualization

Abstract

With equitable key escrow the control of society over the individual and the control of the individual over society are shared fairly. In particular, the control is limited to specified time periods. We consider two applications: time controlled key escrow and time controlled auctions with closed bids. In the first the individual cannot be targeted outside the period authorized by the court. In the second the individual cannot withhold his closed bid beyond the bidding period. We propose two protocols, one for each application. We do not require the use of tamper-proof devices.