A key distribution system equivalent to factoring
Journal of Cryptology
How to share a function securely
STOC '94 Proceedings of the twenty-sixth annual ACM symposium on Theory of computing
A taxonomy for key escrow encryption systems
Communications of the ACM
Proceedings of the 4th ACM conference on Computer and communications security
The risks of key recovery, key escrow, and trusted third-party encryption
World Wide Web Journal - Special issue: Web security: a matter of trust
Robust efficient distributed RSA-key generation
STOC '98 Proceedings of the thirtieth annual ACM symposium on Theory of computing
Cryptography: Theory and Practice
Cryptography: Theory and Practice
Design and Analyses of Two Basic Protocols for Use in TTP-Based Key Escrow
ACISP '97 Proceedings of the Second Australasian Conference on Information Security and Privacy
ACISP '97 Proceedings of the Second Australasian Conference on Information Security and Privacy
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
A Key Escrow System with Warrant Bounds
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Escrow Encryption Systems Visited: Attacks, Analysis and Designs
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Fair Cryptosystems, Revisited: A Rigorous Approach to Key-Escrow (Extended Abstract)
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Efficient Generation of Shared RSA Keys (Extended Abstract)
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Treshold Cryptosystems (invited talk)
ASIACRYPT '92 Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
A Proposed Architecture for Trusted Third Party Services
Proceedings of the International Conference on Cryptography: Policy and Algorithms
Distributed Public Key Cryptosystems
PKC '98 Proceedings of the First International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchy
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Auto-recoverable Auto-certifiable Cryptosystems (A Survey)
Proceedings of the International Exhibition and Congress on Secure Networking - CQRE (Secure) '99
Key Escrow in Mutually Mistrusting Domains
Proceedings of the International Workshop on Security Protocols
Binding ElGamal: a fraud-detectable alternative to key-escrow proposals
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
On the Difficulty of Key Recovery Systems
ISW '99 Proceedings of the Second International Workshop on Information Security
Hi-index | 0.00 |
We consider key escrow system for international communication between multiple domains with different policies. In intercepting international communications between two domains serious problems on unfairness may arise when one government has not authorized the message interception in legal.We solve this problem by incorporating a mechanism that allows message interception by law enforcement parties subject to the consent of both governments involved in the communication. That mechanism involves the establishment of an independent International Trusted Third Party (ITTP) that has the ultimate authority to check of the security policies of each country and permit or deny the interception of international messages. We present a scheme with multiple Diffie-Hellman type key distribution protocoland the ITTP copes with only the secret-key corresponding to its own public-key. We can also make the ITTP "multiple", and we apply recent developed techniques on distributed (threshold) cryptography to our multiple ITTPs. Thus, the establishment and control of an international trusted third party can done with incorporating by each governments.