Abstract
In this paper two kinds of “Robust Threshold Key Escrow Schemes” are analysed systematically and many practical attacks on them, such as Subliminal Channel Attack£-Cheating Attack, etc., are provided. In the meantime, we show whether they gain their end of robustness is worth deliberating. In addition, we also discuss the necessity of some groupware of protocol and establish the basis of analysis on Key Escrow Scheme.
Keywords
Supported by the National Gland for Fundamental Research 973 Program of China under Grant No. G1999035802; the National Natural Science Foundation of China under Grant No. 60253027
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
National Institute for Standards and Technology, Escrowed Encryption Standard, Federal Information Processing Standards Publication 185, U.S. Dept. of Commerce, 1994.
TAHER EIGAMAL, A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms, IEEE TRANS. On Information Theory, vol IT-31, NO.4, 1985.
Lars R. Knudsen, Torben P. Pedersen, On the difficulty on software key escrow, EUROCRYPT’96, p237–244.
S. Micali and R. Shamir, Partial Key Escrow, February 1996.
Nechvatal J.A, Public-key-based key escrow system, Journal of Systems Software, 1996, 35(1): 73–83.
Mike Burmster, Y. Desmedt and Jennifer Seberry, Equitable Key Escrow with Limited time span, AsiaCrypto’98, 1998.
Cao Zhen-Fu, Two classes of Robust Threshold Key Escrow Schemes. Journal of Software, Vol.14, No.6, 2003.
Cao Zhen-Fu, Li Jiguo, A Threshold Key Escrow Scheme Based on EIGamal Public Key Cryptosystem, Chinese Journal of Computers. 2002, 25(4):346–350.
Cao Zhen-Fu, A Threshold Key Escrow Scheme based on public key Cryptosystem. Science in China(Series E), 2001, 44(4):441–448.
Rivest, R.L., Shamir, A. and Adleman, L., A method for Obtaining Digital Signatures and Public-key Cryptosystem, Comm.ACM Vol.21(2), pp.120–126, FEB. 1978.
Shamir A., How to share a secret, Communications of the ACM, 1979, 22(11): 612–613.
Fen Dengguo, Pei Dingyi, Introduction of Cryptology, Science Press, 1999.
J. Kiliam, T. Leighton, Fair Cryptosystems, Revisited, AsiaCrypto’96, 1996.
Simmons, G.J., The Subliminal Channel and Digital Signatures, Advance in Cryptology-Eurocrypto’84, Springer-Verlag, 1985,pp.51–67.
Feng Dengguo etal.£-Review of foreign key escrow systems£-Technical Report£-DCS Center, Chinese Academy of Sciences£-Beijing£-Nov., 1997.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Kluwer Academic Publishers
About this chapter
Cite this chapter
Dengguo, F., Weidong, C. (2004). Analysis on the Two Classes of Robust Threshold Key Escrow Schemes. In: Chen, K. (eds) Progress on Cryptography. The International Series in Engineering and Computer Science, vol 769. Springer, Boston, MA. https://doi.org/10.1007/1-4020-7987-7_18
Download citation
DOI: https://doi.org/10.1007/1-4020-7987-7_18
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4020-7986-3
Online ISBN: 978-1-4020-7987-0
eBook Packages: Springer Book Archive