On the Difficulty of Software Key Escrow

  title={On the Difficulty of Software Key Escrow},
  author={Lars R. Knudsen and Torben P. Pedersen},
At Eurocrypt'95, Desmedt suggested a scheme which allows individuals to en-crypt in such a way that the receiver can be traced by an authority having additional information. This paper shows that the proposed scheme does not have the required properties, by devising three non-speciied protocols misleading the authority. We also discuss how to repair Desmedt's scheme, such that our attacks are no longer possible. However, by allowing slightly more general, but absolutely realistic attacks also… CONTINUE READING

From This Paper

Topics from this paper.


Publications citing this paper.
Showing 1-4 of 4 extracted citations

Compliant cryptologic protocols

International Journal of Information Security • 2002
View 14 Excerpts
Highly Influenced

Hybrid Key Escrow: A New Paradigm

Computers & Security • 2002
View 2 Excerpts


Publications referenced by this paper.
Showing 1-5 of 5 references

Hellman . New directions in cryptography

IEEE Trans . on Information Theory , IT - • 1976

New directions in cryptography

W. Di e, M. Hellman
IEEE Trans. on Infor- mation Theory, • 1976

Similar Papers

Loading similar papers…