Skip to main content

Oblivious key escrow

  • Conference paper
  • First Online:
Information Hiding (IH 1996)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1174))

Included in the following conference series:

Abstract

We propose a simple scheme, based on secret-sharing over large-scale networks, for assuring recoverability of sensitive archived data (e.g., cryptographic keys). In our model anyone can request a copy of the archived data but it is very difficult to keep the existence of a request secret or to subvert the access policy of the data “owner.” We sketch an architecture for a distributed key escrow system that might be suitable for deployment over very large-scale networks such as the Internet. We also introduce a new cryptographic primitive, oblivious multicast, that can serve as the basis for such a system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ross Anderson. “The Eternity Service.” Invited paper to appear at Pragocrypt 96. 30 September–3 October 1996, Prague.

    Google Scholar 

  2. David Chaum. “Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms.” CACM. February 1981.

    Google Scholar 

  3. David Chaum. “Blind Signatures for Untraceable Payments.” Proc. CRYPTO82. August 1982.

    Google Scholar 

  4. Dorothy Denning. “A Taxonomy for Key Escrow Encryption Systems.” CACM. March 1996.

    Google Scholar 

  5. National Institute for Standards and Technology. Escrowed Encryption Standard, FIPS 185. U.S. Dept. of Commerce, 1994.

    Google Scholar 

  6. M. Rabin. “How to Exchange Secrets by Oblivious Transfer.” TR-81. Harvard Aiken Computation Laboratory, 1981.

    Google Scholar 

  7. G.J. Simmons. “An Introduction to Shared Secret and/or Shared Control Schemes and their Applications.” In Contemporary Cryptology, Simmons, ed. IEEE, 1992.

    Google Scholar 

  8. Stephen T. Walker, Stephen B. Lipner, Carl M. Ellison, and David M. Balenson. “Commercial Key Recovery.” CACM. March 1996.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Ross Anderson

Rights and permissions

Reprints and permissions

Copyright information

© 1996 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Blaze, M. (1996). Oblivious key escrow. In: Anderson, R. (eds) Information Hiding. IH 1996. Lecture Notes in Computer Science, vol 1174. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-61996-8_50

Download citation

  • DOI: https://doi.org/10.1007/3-540-61996-8_50

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-61996-3

  • Online ISBN: 978-3-540-49589-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics