Skip to main content

Analysis on the Two Classes of Robust Threshold Key Escrow Schemes

  • Chapter
Progress on Cryptography

Part of the book series: The International Series in Engineering and Computer Science ((SECS,volume 769))

  • 206 Accesses

Abstract

In this paper two kinds of “Robust Threshold Key Escrow Schemes” are analysed systematically and many practical attacks on them, such as Subliminal Channel Attack£-Cheating Attack, etc., are provided. In the meantime, we show whether they gain their end of robustness is worth deliberating. In addition, we also discuss the necessity of some groupware of protocol and establish the basis of analysis on Key Escrow Scheme.

Supported by the National Gland for Fundamental Research 973 Program of China under Grant No. G1999035802; the National Natural Science Foundation of China under Grant No. 60253027

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. National Institute for Standards and Technology, Escrowed Encryption Standard, Federal Information Processing Standards Publication 185, U.S. Dept. of Commerce, 1994.

    Google Scholar 

  2. TAHER EIGAMAL, A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms, IEEE TRANS. On Information Theory, vol IT-31, NO.4, 1985.

    Google Scholar 

  3. Lars R. Knudsen, Torben P. Pedersen, On the difficulty on software key escrow, EUROCRYPT’96, p237–244.

    Google Scholar 

  4. S. Micali and R. Shamir, Partial Key Escrow, February 1996.

    Google Scholar 

  5. Nechvatal J.A, Public-key-based key escrow system, Journal of Systems Software, 1996, 35(1): 73–83.

    Google Scholar 

  6. Mike Burmster, Y. Desmedt and Jennifer Seberry, Equitable Key Escrow with Limited time span, AsiaCrypto’98, 1998.

    Google Scholar 

  7. Cao Zhen-Fu, Two classes of Robust Threshold Key Escrow Schemes. Journal of Software, Vol.14, No.6, 2003.

    Google Scholar 

  8. Cao Zhen-Fu, Li Jiguo, A Threshold Key Escrow Scheme Based on EIGamal Public Key Cryptosystem, Chinese Journal of Computers. 2002, 25(4):346–350.

    MathSciNet  Google Scholar 

  9. Cao Zhen-Fu, A Threshold Key Escrow Scheme based on public key Cryptosystem. Science in China(Series E), 2001, 44(4):441–448.

    Google Scholar 

  10. Rivest, R.L., Shamir, A. and Adleman, L., A method for Obtaining Digital Signatures and Public-key Cryptosystem, Comm.ACM Vol.21(2), pp.120–126, FEB. 1978.

    Article  MathSciNet  Google Scholar 

  11. Shamir A., How to share a secret, Communications of the ACM, 1979, 22(11): 612–613.

    Article  MATH  MathSciNet  Google Scholar 

  12. Fen Dengguo, Pei Dingyi, Introduction of Cryptology, Science Press, 1999.

    Google Scholar 

  13. J. Kiliam, T. Leighton, Fair Cryptosystems, Revisited, AsiaCrypto’96, 1996.

    Google Scholar 

  14. Simmons, G.J., The Subliminal Channel and Digital Signatures, Advance in Cryptology-Eurocrypto’84, Springer-Verlag, 1985,pp.51–67.

    Google Scholar 

  15. Feng Dengguo etal.£-Review of foreign key escrow systems£-Technical Report£-DCS Center, Chinese Academy of Sciences£-Beijing£-Nov., 1997.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Kluwer Academic Publishers

About this chapter

Cite this chapter

Dengguo, F., Weidong, C. (2004). Analysis on the Two Classes of Robust Threshold Key Escrow Schemes. In: Chen, K. (eds) Progress on Cryptography. The International Series in Engineering and Computer Science, vol 769. Springer, Boston, MA. https://doi.org/10.1007/1-4020-7987-7_18

Download citation

  • DOI: https://doi.org/10.1007/1-4020-7987-7_18

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4020-7986-3

  • Online ISBN: 978-1-4020-7987-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics