The risks of key recovery, key escrow, and trusted third-party encryption

@article{Abelson1997TheRO,
  title={The risks of key recovery, key escrow, and trusted third-party encryption},
  author={Harold Abelson and Ross J. Anderson and Steven M. Bellovin and Josh Benaloh and Matt Blaze and Whitfield Diffie and John Gilmore and Peter G. Neumann and Ronald L. Rivest and Jeffrey I. Schiller and Bruce Schneier},
  journal={World Wide Web J.},
  year={1997},
  volume={2},
  pages={241-257}
}
A variety of \key recovery," \key escrow," and \trusted third-party" encryption requirements have been suggested in recent years by government agencies seeking to conduct covert surveillance within the changing environments brought about by new technologies. This report examines the fundamental properties of these requirements and attempts to outline the technical risks, costs, and implications of deploying systems that provide government access to encryption keys. MIT Laboratory for Computer… Expand
A new proxy re-encryption scheme for protecting critical information systems
TLDR
A new proxy re-encryption scheme is presented, which is IND-CCA2 secure in the standard model in a relatively weak model and does not use bilinear parings, and its application in protecting the security of critical information systems is shown. Expand
Cryptographic key recovery
  • Y. Al-Salqan
  • Computer Science
  • Proceedings of the Sixth IEEE Computer Society Workshop on Future Trends of Distributed Computing Systems
  • 1997
TLDR
This paper describes a key recovery mechanism to facilitate the recovery of encryption keys and encrypted data based on adding an extra small field-the Key Recovery Entry (KRE)-to a message or file being transmitted. Expand
How to break fraud-detectable key recovery
TLDR
It is concluded that the concept of binding data does not improve the security of software key recovery but illustrates once more its fundamental problem: itdoes not improve an authorized third party's ability to eavesdrop on serious criminals. Expand
Toward fair international key escrow : An attempt by distributed Trusted Third agencies with threshold cryptography
TLDR
This work incorporates a mechanism that allows message interception by law enforcement parties subject to the consent of both governments involved in the communication by incorporating a mechanism with multiple Diffie-Hellman type key distribution protocol. Expand
Recoverable Encryption through Noised Secret over a Large Cloud
TLDR
Recoverable Encryption encrypts a backup of the key in a manner that restricts practical recovery by an escrow service to one using a large cloud, which makes their use for illegal purposes too dangerous. Expand
Securing password recovery through dispersion
TLDR
This scheme uses secret sharing to disperse password recovery information over several escrow services that authenticate based on a weak password to protect against dictionary attacks, by having the share of the secret be the solution of a puzzle that is solved by brute force in time depending on the number of processors employed. Expand
Toward distributed key management for offline authentication
TLDR
This research will show that key rotation is a superior alternative to existing key recovery and escrow systems in helping users recover when their keys are lost or compromised and will allow remote credentials to be used to issuer, present and appraise remote attestations, without relying on a constant Internet connection. Expand
Recoverable Encryption through Noised Secret Res. Rep. 2012-2-18)
Encryption key safety is the Achilles’ heel of modern cryptography. Simple backup copies offset the risk of key loss, but increase the danger of disclosure, including at the escrow’s site.Expand
Recoverable Encryption through a Noised Secret over a Large Cloud
TLDR
Recoverable Encryption encrypts a backup of the key in a manner that restricts practical recovery by an escrow service to one using a large cloud, which makes their use for illegal purposes too dangerous. Expand
Key Recovery: Inert and Public
TLDR
This framework represents a new direction for key escrow, seeking an acceptable compromise between the demands for control of cryptography on the Internet and the fundamental rights of privacy, which it seeks to align by drawing parallels to the physical world. Expand
...
1
2
3
4
5
...

References

SHOWING 1-2 OF 2 REFERENCES
Di e and Martin Hellman created public key cryptography, which solved the problem of sending coded information between individuals with no prior relationship and is the basis for
  • 1976
He is co-author of the book Firewalls and Internet Security: Repelling the Wily Hacker. In 1995 he was a co-recipient o f the Usenix Lifetime Achievement A w ard for his part in creating Netnews