Skip to main content

A key escrow system of the RSA cryptosystem

  • Key Management
  • Conference paper
  • First Online:
Information Security (ISW 1997)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1396))

Included in the following conference series:

Abstract

This paper focuses a key escrow system of the RSA cryptosystem that protects user privacy with the following properties; (1) neither investigation agency nor key escrow agent accesses private key of user directly, (2) investigation agency can decrypt user data of restricted time period and communication entities, and (3) split private keys of user are deposited correctly in multiple key escrow agents without any information leakage of the private key with help of a zero-knowledge interactive protocol. The security of the whole system is discussed as well as the performance of the zero-knowledge interactive protocol.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. C.Boyd, “Some Applications of Multiple Key Ciphers,” Advances in Cryptology: Proceedings of Crypto 88, Springer-Verlag, pp. 455–467 (1989)

    Google Scholar 

  2. W.Diffie and M.Hellman, “New Directions in Cryptography,” IEEE Transactions of Information Theory, 22 pp. 644–654 (1976)

    Google Scholar 

  3. R.ElGamal, “A public key cryptosystem and a signature scheme based on discrete logarithms,” IEEE Transactions on Information Theory, 31, pp.469–472 (1985)

    Google Scholar 

  4. A.Fiat and A.Shamir, “How To Prove Yourself: Practical Solutions to Identification and Signature Problems,” Advances in Cryptology: Proceedings of Crypto 86, Springer-Verlag, pp. 186–194 (1987)

    Google Scholar 

  5. A.K.Lenstra, P.Winkler and Y.Yacobi, “A Key Escrow System with Warrant Bounds,” Advances in Cryptology: Proceedings of CRYPTO'95, Springer-Verlag, pp. 197–207 (1995)

    Google Scholar 

  6. S.Micali, “Fair Public-Key Cryptosystems,” Advances in Cryptology: Proceedings of CRYPTO'92, Springer-Verlag, pp. 113–138 (1992)

    Google Scholar 

  7. OrganizationforEconomicCo-operationandDevelopment, “OECD Adopts Guidelines for Cryptography Policy,” (http://www.oecd.org/newsand-events/release/nw97-24a.htm) (March 1997)

    Google Scholar 

  8. R.L.Rivest, A.Shamir and L.Adleman, “A method for obtaining digital signatures and public key cryptosystems,” Communications of ACM, 21, pp. 120–126 (1978)

    Google Scholar 

  9. B.Schneier, Applied Cryptography, Second Edition, John Wiley & Sons, Inc. (1996)

    Google Scholar 

  10. I.Taylor (MBE MP Minister for Science & Technology), “Licensing of Trusted Third Parties for the Provision of Encryption Services,” Public Consultation Paper on Detailed Proposals for Legislation (http://dtiinfo1.dti.gov.uk/pubs/) (March 1997)

    Google Scholar 

  11. The White House, Office of the Press Secretary, “Statement by the Press Secretary,” (http://www.eff.org/pub/Privacy/Key-escrow/Clipper/Clipper-II/Clipper /Key-esc:row/CIipl>er_Capstone_EES-I'essera Skipjack/wh_c.ryl)to-original.attnouoce) (16th April 1993)

    Google Scholar 

  12. Y.Yamane and K.Sakurai, “How to restrict investigators' tapping in Key Escrow Systems,” (in Japanese) The 1996 Symposium on Cryptography and Information Security 7C, The Institute of Electronics, Information and Communication Engineers (January 1996)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Eiji Okamoto George Davida Masahiro Mambo

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sameshima, Y. (1998). A key escrow system of the RSA cryptosystem. In: Okamoto, E., Davida, G., Mambo, M. (eds) Information Security. ISW 1997. Lecture Notes in Computer Science, vol 1396. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0030416

Download citation

  • DOI: https://doi.org/10.1007/BFb0030416

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-64382-1

  • Online ISBN: 978-3-540-69767-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics