Abstract
Debate on encryption in Global Information Infrastructures has been complicated by issues relating to law enforcement. This paper looks at a technique for limiting the use of anonymous cash for illicit purposes to an acceptable level. It also argues that the majority of users will not require high level encryption systems to protect their privacy and hence would not require the keys to their encryption schemes to be escrowed. It proposes a scheme of Differential Key Escrow (DKE) where only the keys of high level encryption systems used by government and larger corporations would be held in escrow by the organisation.
This is a preview of subscription content, log in via an institution.
Preview
Unable to display preview. Download preview PDF.
References
P. Barrett. Long-term Cost Effectiveness of Telecommunications Interception Australian Attorney-General's Department, Canberra, March 1994.
Australian Government Publishing Service.Networking Australia's Future, The Final Report of the Broadband Services Expert Group December 1994, (also available from http://www.dca.gov.au or anonymous FTP from www.dca.gov.au (using your e-mail address for password))
DPUBS:7003/93.Australian Controls on the Export of Defence and Related Goods Guidelines for Exporters Department of Defence, Canberra, March 1994
Department of Defence. Australian Controls on the Export of Technology With Civil and Military Applications A Guide for Exporters and Importers Department of Defence, Canberra, November 1994.
Australian Minister for Justice. The High Road to Security Policing the Information Superhighway Speech to the Australian Share/Guide Conference, March 1994, Available from the Australian Attorney-General's Department Canberra
Document Number OCDE/GD(92)190. Guidelines for the Security of Information Systems Organisation for Economic Co-operation and Development Paris 1992 Document Number OCDE/GD(92)190.
Unpublished Working Paper, Public Key Authentication Framework (PKAF) Australian Attorney-General's Department, Canberra, July 1993.
S.T.Walker, Software Key Escrow A better Solution for Law Enforcementt's Needs Trusted Information Systems, Inc, August 1994.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1996 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Orlowski, S. (1996). Encryption and the Global Information Infrastructure: An Australian perspective. In: Dawson, E., Golić, J. (eds) Cryptography: Policy and Algorithms. CPA 1995. Lecture Notes in Computer Science, vol 1029. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0032346
Download citation
DOI: https://doi.org/10.1007/BFb0032346
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-60759-5
Online ISBN: 978-3-540-49363-1
eBook Packages: Springer Book Archive