Skip to main content

A new key escrow cryptosystem

  • Conference paper
  • First Online:
Book cover Cryptography: Policy and Algorithms (CPA 1995)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1029))

Included in the following conference series:

Abstract

The Escrowed Encryption Standard (EES) proposed by U.S. government has gained much attention in the last two years. It was claimed that EES can provide cryptographic protection to unclassified, sensitive data, while at the same time, allow for the decryption of encrypted messages when lawfully authorized. Later, some criticism was proposed to reveal the weakness of the EES proposal.

In this paper we propose a new key escrow cryptosystem. The system eliminates many known weaknesses of the EES proposal. Particularly, the new system strengthens the weakest part of the EES proposal, i.e., the checksum generation, and provides other benefits that the original EES proposal did not have.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. D.M.Balenson, C.M.Ellison, S.B.Lipner, and S.T.Walker, A new approach to software key escrow encryption, manuscript, 1994.

    Google Scholar 

  2. T.Beth, H.Knobloch,M.Otten,G.J.Simmons, and P.Wichmann, Towards acceptable key escrow systems, Proceedings of the 2nd ACM Conference on Computer and Communications Security, 1994, pp.51–58.

    Google Scholar 

  3. T.Beth and M.Otten, eds, Proceedings of the E.I.S.S. Workshop on Escrowed Key Cryptography, Workshop held at the European Institute for System Security, University of Karlsruhe, June 22–24, 1994.

    Google Scholar 

  4. M.Blaze, Protocol failure in the escrowed encryption standard, Proceedings of the 2nd ACM Conference on Computer and Communications Security, 1994, pp.59–67.

    Google Scholar 

  5. B.Chor, A.Fiat and M.Naor, Tracing traitors, CRYPTO'94, pp.257–270.

    Google Scholar 

  6. Y.Desmedt, How to secure the LEAF in Clipper Alternatives, in [3], pp.78–86.

    Google Scholar 

  7. S.Micali, Fair public-key cryptosystems, CRYPTO'92, pp.

    Google Scholar 

  8. National Institute for Standards and Technology, Escrowed Encryption Standard, Federal Information Processing Standards Publication 185, U.S. Dept. of Commerce, 1994.

    Google Scholar 

  9. M.Smid, US government key escrow, talk outline in [3], pp. 45–55.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Ed Dawson Jovan Golić

Rights and permissions

Reprints and permissions

Copyright information

© 1996 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

He, J., Dawson, E. (1996). A new key escrow cryptosystem. In: Dawson, E., Golić, J. (eds) Cryptography: Policy and Algorithms. CPA 1995. Lecture Notes in Computer Science, vol 1029. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0032350

Download citation

  • DOI: https://doi.org/10.1007/BFb0032350

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-60759-5

  • Online ISBN: 978-3-540-49363-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics