Advertisement

Security Analysis and Improvement of the Global Key Recovery System

  • Yanjiang Yang
  • Feng Bao
  • Robert H. Deng
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2384)

Abstract

Key recovery is a technology that allows the owner of encrypted data or a trusted third party to recover encrypted data, mostly by reconstructing lost decryption key. In [HLG99], Harn et al proposed a Global Key Recovery System (GKRS) that combines the functions of the key recovery authorities and the public key certification authorities (CAs). Among other features, user-dominance, i.e., a user is allowed to select his own public-private key pair and especially a public element for verifying the validity of the public-private key pair, is considered extremely important by [HLG99] for wide acceptance of GKRS. In this paper, we attack the RSA version of GKRS by showing that its user-dominant feature and the corresponding key verification scheme employed by the CAs allow for fraud by users against CAs. We then propose an improvement to the original GKRS. The improved system makes the probability of user fraud negligibly small.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [FY95]
    Y. Frankel and M. Yung, Escrow Encryption System Visited: Attack, Analysis and Designs. Advances in Cryptology, Crypto’ 95, LNCS 0963, Springer-Verlag, pp. 222–235, 1995.Google Scholar
  2. [HLG99]
    L. Harn, H. Y. Lin and G. Gong, A Global Key Recovery System, Proceedings of the International Workshop on Cryptographic Techniques & E-Commerce, Hong Kong, pp. 81–85, 1999.Google Scholar
  3. [KL94]
    J. Kilian and T. Leighton, Failsafe Key Escrow, Technical Report 636, MIT Lab, for Computer Science, 1994.Google Scholar
  4. [KP98]
    J. Kilian and E. Petrank, Identity Escrow, Advances in Cryptology, Crypto’ 98, LNCS 1462, 1998.CrossRefGoogle Scholar
  5. [LWY95]
    A. K. Lenstra, P. Winkler, Y. Yacobi, A Key Escrow System with Warrant Bounds, Adances in Cryptology, Crypto’ 95, LNCS 963, pp. 197–207, 1995Google Scholar
  6. [Mic93]
    S. Micali, Fair Public-Key Cryptosystems, Technical Report 579, MIT Lab, for Computer Science, 1993.Google Scholar
  7. [NVBD00]
    J. G. Nieto, K. Viswanathan, C. Boyd and E. Dawson, Key Recovery System for the Commerical Environment, Security and Privacy (ACISP’ 2000), Springer-Verlag, pp. 149–162, 2000.Google Scholar
  8. [VBD99]
    K. Viswanathan, C. Boyd and E. Dawson, Publicly Verifiable Key Escrow with Limited Time Span, Information Security and Privacy (ACISP’ 99), LNCS 1587, Springer-Verlag, pp. 36–51, 1999.CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2002

Authors and Affiliations

  • Yanjiang Yang
    • 1
  • Feng Bao
    • 1
  • Robert H. Deng
    • 1
  1. 1.Laboratories for Information TechnologySingapore

Personalised recommendations