Divertible zero knowledge interactive proofs and commutative random self-reducibility
EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Subliminal communication is easy using the DSA
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Towards acceptable key escrow systems
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Protocol failure in the escrowed encryption standard
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
How to share a function securely
STOC '94 Proceedings of the twenty-sixth annual ACM symposium on Theory of computing
Protocol failure in the Escrowed Encryption Standard
Building in big brother
A taxonomy for key escrow encryption systems
Communications of the ACM
Proxy signatures for delegating signing operation
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Proceedings of the 4th ACM conference on Computer and communications security
On the importance of securing your bins: the garbage-man-in-the-middle attack
Proceedings of the 4th ACM conference on Computer and communications security
The risks of key recovery, key escrow, and trusted third-party encryption
World Wide Web Journal - Special issue: Web security: a matter of trust
How to break fraud-detectable key recovery
ACM SIGOPS Operating Systems Review
Another approach to software key escrow encryption
ACISP '96 Proceedings of the First Australasian Conference on Information Security and Privacy
ACISP '97 Proceedings of the Second Australasian Conference on Information Security and Privacy
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
A Key Escrow System with Warrant Bounds
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Escrow Encryption Systems Visited: Attacks, Analysis and Designs
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Fair Cryptosystems, Revisited: A Rigorous Approach to Key-Escrow (Extended Abstract)
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Robustness Principles for Public Key Protocols
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
The Dark Side of "Black-Box" Cryptography, or: Should We Trust Capstone?
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
The Prevalence of Kleptographic Attacks on Discrete-Log Based Cryptosystems
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
How to Utilize the Transformability of Digital Signatures for Solving the Oracle Problem
ASIACRYPT '96 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically)
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Proceedings of the First International Workshop on Information Hiding
Blind Decoding, Blind Undeniable Signatures, and Their Applications to Privacy Protection
Proceedings of the First International Workshop on Information Hiding
A Proposed Architecture for Trusted Third Party Services
Proceedings of the International Conference on Cryptography: Policy and Algorithms
A Key Escrow System with Protecting User's Privacy by Blind Decoding
ISW '97 Proceedings of the First International Workshop on Information Security
ISW '97 Proceedings of the First International Workshop on Information Security
Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchy
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Toward Fair International Key Escrow
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Auto-recoverable Auto-certifiable Cryptosystems (A Survey)
Proceedings of the International Exhibition and Congress on Secure Networking - CQRE (Secure) '99
On the key recovery of the Key Escrow System
ACSAC '97 Proceedings of the 13th Annual Computer Security Applications Conference
Translucent Cryptography -- An Alternative to Key Escrow and its Implementation via Fractional Oblivious Transfer
Encapsulated Key Escrow
Publicly verifiable secret sharing
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
On the difficulty of software key escrow
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Kleptography: using cryptography against cryptography
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
The GCHQ protocol and its problems
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Hi-index | 0.00 |
Key escrow cryptography has been becoming popular recently. A key escrow system bridges the gap between users' privacy and social need for protection against criminal behavior. However, there are some disadvantages and controversies regarding the system. In this paper we review and analyze the weaknesses of several recent protocols. The protocols are examined with respect to their claimed issues.