Abstract
The Escrowed Encryption Standard (EES) proposed by U.S. government has gained much attention in the last two years. It was claimed that EES can provide cryptographic protection to unclassified, sensitive data, while at the same time, allow for the decryption of encrypted messages when lawfully authorized. Later, some criticism was proposed to reveal the weakness of the EES proposal.
In this paper we propose a new key escrow cryptosystem. The system eliminates many known weaknesses of the EES proposal. Particularly, the new system strengthens the weakest part of the EES proposal, i.e., the checksum generation, and provides other benefits that the original EES proposal did not have.
Preview
Unable to display preview. Download preview PDF.
References
D.M.Balenson, C.M.Ellison, S.B.Lipner, and S.T.Walker, A new approach to software key escrow encryption, manuscript, 1994.
T.Beth, H.Knobloch,M.Otten,G.J.Simmons, and P.Wichmann, Towards acceptable key escrow systems, Proceedings of the 2nd ACM Conference on Computer and Communications Security, 1994, pp.51–58.
T.Beth and M.Otten, eds, Proceedings of the E.I.S.S. Workshop on Escrowed Key Cryptography, Workshop held at the European Institute for System Security, University of Karlsruhe, June 22–24, 1994.
M.Blaze, Protocol failure in the escrowed encryption standard, Proceedings of the 2nd ACM Conference on Computer and Communications Security, 1994, pp.59–67.
B.Chor, A.Fiat and M.Naor, Tracing traitors, CRYPTO'94, pp.257–270.
Y.Desmedt, How to secure the LEAF in Clipper Alternatives, in [3], pp.78–86.
S.Micali, Fair public-key cryptosystems, CRYPTO'92, pp.
National Institute for Standards and Technology, Escrowed Encryption Standard, Federal Information Processing Standards Publication 185, U.S. Dept. of Commerce, 1994.
M.Smid, US government key escrow, talk outline in [3], pp. 45–55.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1996 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
He, J., Dawson, E. (1996). A new key escrow cryptosystem. In: Dawson, E., Golić, J. (eds) Cryptography: Policy and Algorithms. CPA 1995. Lecture Notes in Computer Science, vol 1029. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0032350
Download citation
DOI: https://doi.org/10.1007/BFb0032350
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-60759-5
Online ISBN: 978-3-540-49363-1
eBook Packages: Springer Book Archive